Information Security and Privacy Quick Reference
by Mike Chapple, Joe Shelley, James Michael Stewart
CHAPTER 10Application Security
Ensuring the security of applications is paramount. As a security and privacy professional, you are on the front lines of defending against a myriad of threats that target applications, which are often the gateway to sensitive data and critical systems. This chapter is designed to equip you with the knowledge and tools necessary to fortify your applications against these threats. By understanding and implementing secure software development practices, integrating security into DevOps processes, and recognizing common attack vectors, you can significantly enhance the resilience of your applications.
Throughout this chapter, you will gain insights into the Secure Software Development Life Cycle, which is essential for building robust and secure applications from the ground up. You will explore the integration of security into DevOps, a practice that ensures security is not an afterthought but a continuous process embedded in the development workflow. Additionally, you will learn about various application attacks, including injection and authorization vulnerabilities, and how to defend against them. By mastering application security controls and adhering to secure coding best practices, you will be well-equipped to protect your applications from potential exploits. This chapter aims to provide you with a comprehensive understanding of application security, empowering you to safeguard your organization's digital assets effectively.
Secure Software ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access