SAP Knowledge Base Article - Preview

3159119 - Securing NodeJS Code in BTP Cloud Foundry

Symptom

  • When deployed NodeJS applications to CF, it is run as non-root user?
  • Implement the following in NodeJS coding or this is already pre-built in CF or have similar service already implemented?
     a. Ensure use of 'ratelimiter flexible' package to prevent Brute force attacks.
     b. Ensure use of 'Helmet' module to set security-related HTTP response headers.
     c. Use csurf module for protecting against CSRF attacks.


Read more...

Environment

  • Node.js runtime on BTP Cloud Foundry.

Keywords

Node, nodejs, CF, cloud foundry, BTP, BTP CF, security, brute force, attacks, Nodejs applications, protect the application, outside world attacks, js runtime, node.js, runtime. , KBA , BC-CP-CF , Cloud Foundry , BC-XS-BLDP , On-Premise XSA Buildpacks (Java, Node.js, Python) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.