1 Defense in depth

This chapter covers

  • Defining your attack surface
  • Introducing defense in depth
  • Adhering to standards, best practices, and fundamentals
  • Identifying Python security tools

You trust organizations with your personal information more now than ever before. Unfortunately, some of these organizations have already surrendered your information to attackers. If you find this hard to believe, visit https://haveibeenpwned.com. This site allows you to easily search a database containing the email addresses for billions of compromised accounts. With time, this database will only grow larger. As software users, we have developed an appreciation for security through this common experience.

Because you’ve opened this book, I’m betting you ...

Get Full Stack Python Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.