Important Information
-
In this HTML file, a
merchantUniquePaymentId
is generated automatically forUser Acceptance Testing (UAT) purposes
When moving to a production environment, it's important to replace this with acustom-generated unique ID
to ensure each payment is distinctly identified. -
The generation of
fingerprint
is currently demonstrated within this HTML file forexample purposes
. Thefingerprint
, must be generated andhashed
on theserver side
. This measure prevents exposure to the front end and potential interception by unauthorized parties. -
HTTPS Enforcement:
Secure all web traffic by enforcingHTTPS
with a minimum ofTLS version 1.2 or above
to encrypt data and protect against interception. -
API Rate Limiting:
IntroduceAPI
rate limiting to curb excessive requests and adoptnon-descriptive error messages
-
Referrer Header Checks:
Validate theHTTP
referrer header server-side to ensure requests are originating from your site, especially for sensitive actions like checkout. -
CSRF Token Implementation:
Implement a uniqueCSRF token
for eachuser session
within the checkout process. Generate thistoken server-side
and embed it as a hidden field in the payment form. Upon the form's submission, theserver
will validate thetoken against the session
, ensuring the request originates from the authenticated user's active session, thereby enhancing security againstCSRF
attacks. -
CAPTCHA Solutions:
IncorporateCAPTCHA
mechanisms, such ashCaptcha
,Cloudflare Turnstile
, orGoogle reCAPTCHA
, to differentiate human users from automated bots. Validate theHTTP
referrer header server-side to ensure requests are originating from your site, especially for sensitive actions like checkout. -
Adherence to OWASP Top Ten:
Regularly consult and adhere to the OWASP Top Ten list of security risks to maintain awareness and defense against common web application vulnerabilities.