From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Secure coding methodologies

Secure coding methodologies

Let's explore some secure coding methodologies, starting with ASVS. Now this is from OWASP, the aforementioned OWASP, their Application Security Verification Standard. This is a project that gives developers a kind of a laundry list of requirements or best practices for secure application development, specifically in the cloud. So it's a basis for testing application tentacle security controls. It also applies tentacle security controls in your on-premises environment as well. It's used to mitigate attacks like cross-site scripting, request forgery, and SQL injection. The ASVS requirements were developed to be used as a meaningful metric or a set of metrics, as secure development guidance, and to be used during the procurement process early in the development lifecycle. Also be aware of SafeCode on the exam. This is a global non-profit organization that brings together technical and business or non-technical leaders. It facilitates the exchange or interchange of insights, visibility…

Contents