From the course: Programming Foundations: Secure Coding
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Configuration issues
From the course: Programming Foundations: Secure Coding
Configuration issues
- A somewhat common theme should be identified by this point. We find that in many cases the process that make running, deploying and troubleshooting an application much easier can also be used to exploit an application. Configuration of our application is another such case. So what is configuration? To SANS for instance, secure configurations apply to the systems and servers. It's the software and operating systems the machines are running on. It's definitely critical to keep systems patched. But from a development perspective, this isn't configuration. When I talk about securing your configuration, I'm referring to the feature flags, options, and other data elements that your application needs to run, but they can be optionally configured at startup or runtime. Many times as developers, we want to soft rollout of features through the use of feature flags, or provide ways to put the application into a higher state…
Contents
-
-
-
-
-
(Locked)
Error handling issues3m 21s
-
(Locked)
Logging and output issues4m 9s
-
(Locked)
Internal data management issues3m 9s
-
(Locked)
Configuration issues4m 29s
-
(Locked)
Database issues3m 51s
-
(Locked)
File and I/O issues3m 54s
-
(Locked)
Memory management issues4m 34s
-
(Locked)
Dependency issues2m 46s
-
(Locked)
-
-
-
-