Validate input. Validate inputs from all untrusted data sources. Proper input validation can eliminates the vast majority of software vulnerabilities. Be suspicious of most external data sources, including command line argument, network interfaces, environmental variables, and user controlled files . Heed compiler warnings. Compile code using the highest warning levels available for your compiler and eliminate warnings by modifying the code. Use static and dynamic analysis tools to detect and eliminate additional security flaws. Architect and design for security policies. Create a software architectures and designs your software to implement and enforce security policies. For example, if your system requires
The post 10 Best Rules to follow if you want to Code your App Securely appeared first on Coding Security.
10 Best Rules to follow if you want to Code your App Securely
read more
Tidak ada komentar:
Posting Komentar