Skip to main content

Posts

Showing posts from June, 2020

Top 10 Secure Coding Practices

Input Validation: Conduct all data validation on a trusted system (e.g., The server)  Identify all data sources and classify them into trusted and untrusted. Validate all data from untrusted sources (e.g., Databases, file streams, etc.) There should be a centralized input validation routine for the application Validate all client provided data before processing, including all parameters, URLs and HTTP header content (e.g. Cookie names and values). Be sure to include automated post backs from JavaScript, Flash or other embedded code Verify that header values in both requests and responses contain only ASCII characters   Authentication and Password Management: Require authentication for all pages and resources, except those specifically intended to be public. If your application manages a credential store, it should ensure that only cryptographically strong oneway salted hashes of passwords are stored and that the table/file that stores the passwords and keys is write-able ...