Application Design #
This section contains articles explaining how you can:
- Defend against cache probing attacks, see Cache Protections.
- Protect especially sensitive endpoints, see Subresource Protections.
This section contains articles explaining how you can: