From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Secure coding methodologies
From the course: Cloud Data, Platform, and Applications Security by Pearson
Secure coding methodologies
Let's explore some secure coding methodologies, starting with ASVS. Now this is from OWASP, the aforementioned OWASP, their Application Security Verification Standard. This is a project that gives developers a kind of a laundry list of requirements or best practices for secure application development, specifically in the cloud. So it's a basis for testing application tentacle security controls. It also applies tentacle security controls in your on-premises environment as well. It's used to mitigate attacks like cross-site scripting, request forgery, and SQL injection. The ASVS requirements were developed to be used as a meaningful metric or a set of metrics, as secure development guidance, and to be used during the procurement process early in the development lifecycle. Also be aware of SafeCode on the exam. This is a global non-profit organization that brings together technical and business or non-technical leaders. It facilitates the exchange or interchange of insights, visibility…
Contents
-
-
-
-
-
-
-
-
(Locked)
Module introduction1m 25s
-
(Locked)
Learning objectives32s
-
(Locked)
Cloud application architecture elements10m 1s
-
(Locked)
Cloud development6m 9s
-
(Locked)
SDLC business requirements and phases8m 56s
-
(Locked)
Common software vulnerabilities5m 55s
-
(Locked)
Software threat modeling methods8m 53s
-
(Locked)
Secure coding methodologies5m 48s
-
(Locked)
Software configuration management and versioning4m 46s
-
(Locked)
-
-
-