Chapter 1

Secure development lifecycle processes

After completing this chapter, you will be able to:

  • Understand some of the processes required to build more secure software.

  • Grow a security culture within your organization.

  • Explain the purpose of different types of environments for development work to production and how they require nuanced security controls.

Developers are the number-one source of compromises

The number-one source of compromises isn’t hackers, attackers, or other nefarious actors. Rather, the number-one source of compromises is us—the software development community. Indeed, according to a 2020 analysis by Contrast Security, almost 50 percent of all compromises are due to vulnerabilities within applications—vulnerabilities ...

Get Designing and Developing Secure Azure Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.