The cheat sheet below condenses insights extracted from the OWASP article about credential stuffing prevention. This table aims to offer a concise and user-friendly overview that can be swiftly referenced for a quick grasp of key points. For further information, please visit OWASP – Credential Stuffing Prevention
Topic
Multi-Factor Authentication
Alternative Defenses
Secondary Passwords, PINs, etc.
CAPTCHA
IP Block-listing
Device Fingerprinting
Require Unpredictable Usernames
Defense in Depth
Multi-Step Login Processes
Require JavaScript
Identifying Leaked Passwords
Notify users about security
Key Points
Use conditional MFA for specific situations (new devices, unusual locations).
Consider trusted IP ranges for enterprise apps.
Balance security and usability.
Tailor defenses to user roles.
Strengthen protection for critical roles.
Layer defenses for enhanced security.
Enhance protection with added security questions or PINs.
Note that these methods don't replace MFA, but supplement it.
Enhance security by requiring CAPTCHAs in risky scenarios.
Find the right balance between security and user experience.
Separate per-user failures from brute-force protection.
Continuously update block lists from publicly available data sources.
Ensure temporary nature of block-listing to avoid legitimate user inconvenience.
Prompt for additional authentication if device fingerprint doesn't match.
Be cautious of attackers spoofing client-provided data.
Generate usernames that aren't easily guessable or based on personal info.
Prevent attackers from using known usernames.
Slow down attackers relying on off-the-shelf tools.
Focus on comprehensive security posture to discourage attackers.
Require sequential username-password entry.
Use CSRF tokens to make attacks more complex.
Discourage attackers using simple tools.
Consider impact on accessibility, especially for users relying on screen readers.
Enhance security against basic POST request attacks.
Prevent use of passwords from breaches.
Protect users from reusing compromised passwords.
Notify users of active sessions and their details.
Empower users to take appropriate actions.
Enhance user security awareness through timely alerts.