0% found this document useful (0 votes)
65 views2 pages

Secure Coding Guidelines

The document lists the titles of various security cheat sheets covering topics such as AJAX security, abuse cases, access control, attack surface analysis, authentication, authorization testing, and more. The cheat sheets provide concise guidance on securing technologies and applications across a wide range of security domains.

Uploaded by

Tushar Sethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views2 pages

Secure Coding Guidelines

The document lists the titles of various security cheat sheets covering topics such as AJAX security, abuse cases, access control, attack surface analysis, authentication, authorization testing, and more. The cheat sheets provide concise guidance on securing technologies and applications across a wide range of security domains.

Uploaded by

Tushar Sethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

AJAX Security Cheat Sheet

Abuse Case Cheat Sheet

Access Control Cheat Sheet

Attack Surface Analysis Cheat Sheet

Authentication Cheat Sheet

Authorization Testing Automation Cheat Sheet

Bean Validation Cheat Sheet

C-Based Toolchain Hardening Cheat Sheet

Choosing and Using Security Questions Cheat Sheet

Clickjacking Defense Cheat Sheet

Content Security Policy Cheat Sheet

Credential Stuffing Prevention Cheat Sheet

Cross-Site Request Forgery Prevention Cheat Sheet

Cross Site Scripting Prevention Cheat Sheet

Cryptographic Storage Cheat Sheet

DOM based XSS Prevention Cheat Sheet

Database Security Cheat Sheet

Denial of Service Cheat Sheet

Deserialization Cheat Sheet

Docker Security Cheat Sheet

DotNet Security Cheat Sheet

Error Handling Cheat Sheet

File Upload Cheat Sheet

Forgot Password Cheat Sheet

HTML5 Security Cheat Sheet

HTTP Strict Transport Security Cheat Sheet

Injection Prevention Cheat Sheet

Injection Prevention in Java Cheat Sheet

Input Validation Cheat Sheet

Insecure Direct Object Reference Prevention Cheat Sheet

JAAS Cheat Sheet

JSON Web Token for Java Cheat Sheet

Key Management Cheat Sheet

LDAP Injection Prevention Cheat Sheet


Logging Cheat Sheet

Mass Assignment Cheat Sheet

Microservices based Security Arch Doc Cheat Sheet

Multifactor Authentication Cheat Sheet

Nodejs Security Cheat Sheet

OS Command Injection Defense Cheat Sheet

PHP Configuration Cheat Sheet

Password Storage Cheat Sheet

Pinning Cheat Sheet

Query Parameterization Cheat Sheet

REST Assessment Cheat Sheet

REST Security Cheat Sheet

Ruby on Rails Cheat Sheet

SAML Security Cheat Sheet

SQL Injection Prevention Cheat Sheet

Securing Cascading Style Sheets Cheat Sheet

Server Side Request Forgery Prevention Cheat Sheet

Session Management Cheat Sheet

TLS Cipher String Cheat Sheet

Third Party JavaScript Management Cheat Sheet

Threat Modeling Cheat Sheet

Transaction Authorization Cheat Sheet

Transport Layer Protection Cheat Sheet

Unvalidated Redirects and Forwards Cheat Sheet

User Privacy Protection Cheat Sheet

Virtual Patching Cheat Sheet

Vulnerability Disclosure Cheat Sheet

Vulnerable Dependency Management Cheat Sheet

Web Service Security Cheat Sheet

XML External Entity Prevention Cheat Sheet

XML Security Cheat Sheet

You might also like