Skip to content

Commit

Permalink
Merge pull request #72 from cedar-policy/input_validation_text
Browse files Browse the repository at this point in the history
Input validation text
  • Loading branch information
aaronjeline committed Dec 8, 2023
2 parents 5e1a59e + 1af316a commit ecb7408
Showing 1 changed file with 7 additions and 0 deletions.
7 changes: 7 additions & 0 deletions docs/collections/_other/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,13 @@ The Cedar validator can detect the many types of bugs, including the following:

Writing a schema and using the policy validator can give you increased confidence that you’ve written your authorization policies correctly. It is your responsibility to write a schema that correctly models your data. It is the responsibility of Cedar to ensure that the validator is correct. We achieve a high confidence in the correctness of the validator by formally modeling it using Dafny. We have proved the correctness of the validation algorithm, and we use differential testing to ensure the production validator matches the behavior of the formal model. For more information, see [Cedar policy validation against schema](../policies/validation.html).

## Input Validation {#security-input-validation}
The Cedar spec places no restrictions on the size of Cedar policies, schemas, or requests.
It is important for services accepting arbitrary Cedar inputs to place a bound on input sizes to protect against memory exhaustion.
The parsers provided by Cedar are safe to execute on bounded, arbitrary inputs, and are the suggested way to validate inputs.
Cedar policies of a bounded size are guaranteed to terminate, and are effect free.


## Security best practices for applications using Cedar {#security-best-practices}

Some security best practices for applications that use Cedar are as follows:
Expand Down

0 comments on commit ecb7408

Please sign in to comment.