Skip to content

Security: sandeepkumar0801/ToursAndActivities

Security

SECURITY.md

Security Policy

Supported Versions

This project is actively maintained. Security updates are provided for the following versions:

Version Supported
1.x.x
< 1.0

Reporting a Vulnerability

We take the security of this project seriously. If you discover a security vulnerability, please follow these steps:

How to Report

  1. DO NOT create a public GitHub issue for security vulnerabilities
  2. Email security concerns to: [your-email@example.com]
  3. Include the following information:
    • Description of the vulnerability
    • Steps to reproduce the issue
    • Potential impact
    • Suggested fix (if any)

What to Expect

  • Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
  • Assessment: We will assess the vulnerability and determine its severity within 5 business days
  • Updates: We will keep you informed of our progress
  • Resolution: We aim to resolve critical vulnerabilities within 30 days
  • Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)

Security Best Practices

For Users/Developers

  1. Never commit sensitive data:

    • API keys
    • Passwords
    • Connection strings
    • Certificates
    • Private keys
  2. Use environment variables or secure configuration:

    • Store secrets in Azure Key Vault
    • Use environment-specific configuration files
    • Never commit appsettings.json with real credentials
  3. Keep dependencies updated:

    • Regularly update NuGet packages
    • Monitor Dependabot alerts
    • Review security advisories
  4. Follow secure coding practices:

    • Validate all user input
    • Use parameterized queries
    • Implement proper authentication and authorization
    • Enable HTTPS/TLS

Configuration Security

This repository includes:

  • appsettings.example.json - Template with placeholders
  • appsettings.json - Excluded from repository (contains real secrets)

Always use the example file as a template and create your own configuration files locally.

Known Security Considerations

Authentication

  • JWT tokens are used for API authentication
  • Tokens should be stored securely on the client side
  • Token expiration should be configured appropriately

API Keys

  • All third-party API keys must be stored in configuration
  • Never hardcode API keys in source code
  • Rotate API keys regularly

Database Security

  • Use parameterized queries to prevent SQL injection
  • Implement proper access controls
  • Encrypt sensitive data at rest

HTTPS/TLS

  • Always use HTTPS in production
  • Configure proper SSL/TLS certificates
  • Enforce HTTPS redirection

Security Features

This project implements:

  • JWT Authentication - Token-based authentication
  • Input Validation - Request validation and sanitization
  • SQL Injection Prevention - Parameterized queries
  • CORS Configuration - Cross-origin resource sharing controls
  • Rate Limiting - API throttling
  • HTTPS Enforcement - Secure communication
  • Certificate-based Auth - For secure supplier integrations

Dependency Security

Automated Security Scanning

We use:

  • Dependabot - Automated dependency updates
  • GitHub Security Advisories - Vulnerability notifications
  • NuGet Package Vulnerability Scanning - Built-in .NET security

Manual Review

  • Regular security audits of dependencies
  • Review of third-party package licenses
  • Assessment of package maintainer reputation

Compliance

This project follows:

  • OWASP Top 10 - Web application security risks
  • CWE/SANS Top 25 - Most dangerous software weaknesses
  • Microsoft Security Development Lifecycle (SDL)

Security Checklist for Contributors

Before submitting a pull request:

  • No sensitive data in commits
  • No hardcoded credentials
  • Input validation implemented
  • SQL injection prevention verified
  • XSS prevention implemented
  • Authentication/authorization checked
  • HTTPS enforced
  • Dependencies updated
  • Security tests passed

Incident Response

In case of a security incident:

  1. Immediate Action: Contain the incident
  2. Assessment: Evaluate the impact
  3. Notification: Inform affected parties
  4. Remediation: Fix the vulnerability
  5. Post-Incident: Review and improve processes

Contact

For security-related questions or concerns:

Acknowledgments

We appreciate the security research community and thank all researchers who responsibly disclose vulnerabilities.


Last Updated: 2025-11-20
Version: 1.0

There aren’t any published security advisories