🔐
DevSec
💻 GitHub
  • 👋Welcome
    • DevSec
    • Glossary
    • Contributing
    • Discussions
  • 📖Resources
    • Articles
    • Books
    • Communities
    • Institutions
    • Conferences
    • Sites
    • Podcasts
    • Training
    • Other
  • ⚒️Tools
    • Static Analysis
    • Dynamic Analysis
    • Vulnerabilities Analysis
    • Dependency Management
    • Supply Chain
    • Secrets
      • Secrets Management
      • Secrets Scanning
    • Infrastructure as Code (IaC)
    • Other
  • 🔧Generic Development
    • Security Basics
    • Containers
    • Git & other VCS
    • Cryptography
  • ☁️Web Development
    • Generic
    • APIs
  • ☁️Cloud
    • Cloud native
    • Kubernetes
  • 😈On the other side
    • Red team
Powered by GitBook
On this page
  • About
  • Awareness
  • Secure Coding Practices
  • Getting some help

Was this helpful?

Edit on GitHub
  1. Generic Development

Security Basics

Let's start from the beginning...

PreviousOtherNextContainers

Last updated 1 year ago

Was this helpful?

About

This page is meant to be as an starting point for security in development, for developers with little or no experience at all with secure development and good security practices in development.

Awareness

Every year vulnerabilities tend to grow in numbers () as well as weakness in code ().

Lots of enterprises are more aware about security in their software, ransomware groups and attacks are pretty common every single day, automated scannners for common vulnerabilities run by bad actors...

The are lots of reasons to take security seriously as a developer. Just take a Raspberry Pi (or other similar device) or spin up a VM in a cloud service, and open SSH port on port 22 publicly... You will be shocked with the number of attempts to login to your device...

Then have a look to some of this visualization tools:

  • offers where you can see an instant overview of internet insights (some regarding security and attacks).

  • The provides

  • offers where you can see attacks in real time, as well as attacks on the day of visit (tends to grow to millions a day).

  • offers , a realtime CyberTheat map.

  • offers worth to check out.

  • offers , its own cyber threat real-time map.

  • also offers .

  • And lots of other tools:

Search news for data breaches, security incidents, ransomware attacks.

Are you more concerned now?

Great. Let's improve this situation...

Secure Coding Practices

This checklist covers the following points:

From the last bullet point, make sure you are following this coding practices:

Getting some help

You don't have to do all of this without help!

Look for professionals, professional enterprise ready tools and solutions. awesome OSS projects and others in other sections of this page...

A good starting point is to look at , these are the main application security risks that are most important nowadays. The goal is to minimise these risks.

A very good starting point to ensure whatever you are developing, you meet with .

about it, it's also very useful.

(this last point is very important)

Use or hashes to verify the integrity of interpreted code, libraries, executables, and configuration files.

🔧
as you can see in CVE Details
view CWE from Mitre
Cloudflare
"Cloudflare Radar"
NIST (National Instutute of Standards and Technology)
multiple visualizations of it's vulnerability database.
CheckPoint
ThreatMap
Kaspersky
Cybermap
Radware
another live threat map
NetScout
Horizon
Imperva
its own cyber threat attack map
Digital Attack Map (DDoS attacks)
Akamai Internet Station (Cyber attacks)
Threatbutt Internet Hacking Attack Attribution Map
Fortiguard (Fortinet) threat map
Bitdefender Cyberthreat real time map
Talos Cyber attack map (Spam & Malware)
SonicWall live attack map
OWASP Top Ten
this OWASP checklist
This SecureCoding blog post
Input Validation
Output Encoding
Authentication & Password Management
Session Management
Access Control
Cryptographic Practices
Error Handling & Logging
Data Protection
Communication Security
System Configuration
Database Security
File Management
Memory Management
General coding practices
checksums