17 Plan B: Plugging the Holes in Your Existing Application
It’s a lot harder to secure an application that’s already been written than it is to write it securely in the first place. Unfortunately, it’s also a much more common scenario. That’s just life, so in this chapter we give you some concrete ways to harden an existing application.
Set Up Your Environment
If you’re already using a three-stage deployment system, you’re ahead of the pack and odds are your code is more stable and more secure because of it. If not, read this section carefully and give some serious thought to implementing this type of system.
Using a Three-Stage Deployment
The three stages of deployment are development, test, and production. ...
Get Securing PHP Web Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.