O'Reilly logo

Application Security in the ISO 27001:2013 Environment by Vinod Vasudevan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 9: SECURE CODING GUIDELINES

 

 

 

In Chapter 7 we discussed the role of secure coding guidelines in ensuring that applications are secure. In this chapter we look at some of the most important guidelines developers should follow; for a comprehensive look at the topic, the OWASP Secure Coding Practices Guide is recommended.50 Since many of these are low-level code writing requirements, we illustrate the guidelines with code snippets. As the coding guidelines are platform-agnostic and apply to all popular platforms, we show code snippets only for one platform, .NET. The examples we show with .NET can be ported to J2EE, PHP, Perl and other platforms, too.

We classify the coding guidelines into seven categories:

  1. Input validation guidelines ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required