Security Basics
Let's start from the beginning...
Last updated
Was this helpful?
Let's start from the beginning...
Last updated
Was this helpful?
This page is meant to be as an starting point for security in development, for developers with little or no experience at all with secure development and good security practices in development.
Every year vulnerabilities tend to grow in numbers () as well as weakness in code ().
Lots of enterprises are more aware about security in their software, ransomware groups and attacks are pretty common every single day, automated scannners for common vulnerabilities run by bad actors...
The are lots of reasons to take security seriously as a developer. Just take a Raspberry Pi (or other similar device) or spin up a VM in a cloud service, and open SSH port on port 22 publicly... You will be shocked with the number of attempts to login to your device...
Then have a look to some of this visualization tools:
offers where you can see an instant overview of internet insights (some regarding security and attacks).
The provides
offers where you can see attacks in real time, as well as attacks on the day of visit (tends to grow to millions a day).
offers , a realtime CyberTheat map.
offers worth to check out.
offers , its own cyber threat real-time map.
also offers .
And lots of other tools:
Search news for data breaches, security incidents, ransomware attacks.
Are you more concerned now?
Great. Let's improve this situation...
This checklist covers the following points:
From the last bullet point, make sure you are following this coding practices:
You don't have to do all of this without help!
Look for professionals, professional enterprise ready tools and solutions. awesome OSS projects and others in other sections of this page...
A good starting point is to look at , these are the main application security risks that are most important nowadays. The goal is to minimise these risks.
A very good starting point to ensure whatever you are developing, you meet with .
about it, it's also very useful.
(this last point is very important)
Use or hashes to verify the integrity of interpreted code, libraries, executables, and configuration files.