Secure Coding Guidelines OWASP
Secure Coding Guidelines OWASP
eCodi
ngGui
del
i
nes
OWASP
Secur
eCodi
ngGui
del
inesOWASP
Secur
eCodi
ngisapract
iceofdevel
opi
ngsoftware/
appl
icati
onsinsucha
mannert
hatensur
esnoroom f
orvul
nerabi
l
iti
es.
Foll
owi
ngt hi
spract
icei
n
busi
ness,
organi
zat
ionscansecur
ethei
rappl
i
cat
ionsorwebsi
tesf
rom
ex
ploi
tat
ionsandensur
edat
aint
egr
it
y.
Secur
eCodi
ngGui
del
ines
Secur
ecodingi
sasecur
it
ytacti
cthathelpsinthedevel
opmentofcomput
er
sof
twarei
nsuchawaythatwit
hstandsresi
li
encetotheacci
dent
al
i
ntr
oduct
ionofvul
ner
abi
l
iti
es.
Secur
it
yfl
aws,
def
ect
s,andl
ogi
cfaul
tsar
e
somef actorst
hatpr
imar
il
yleadt
osof
twar
e/appl
i
cat
ionsvul
ner
abi
l
ity
expl
oit
ations.
Ther
ear
eaf
ew secur
ecodegui
del
i
nest
hatbusi
nessesmustf
oll
ow:
Vali
dateInput:val
i
dat i
nginputsfrom allunrel
iablesourcescanel i
mi nate
thepossi
bil
it
yofapplicati
on/sof
twarevul nerabil
i
ties.Specif
ical
ly,val
idate
thedataofcommandl ineargument s,envir
onment alvari
ables,networ k
i
nterf
aces,anduser-control
l
edf i
l
es.
KeepYourCodeSt
ructur
eSi
mple:
Keepthelayoutassimpl
eandconci
se
aspossi
ble.
Compl
icat
eddesi
gnsmajor
lyl
eadt oerr
orsdur
ingt
heti
meof
i
mpl
ement
ati
on,
conf
igur
ati
on,
anduse.
HeedCompi l
erWarnings:Al
wayspayat
tent
iont
omodi f
yingyourcodeas
perthecompil
erwarningsandmakeuseoft
hehighestl
evelavai
labl
efor
yourcompil
er.
I
mpl ementEff
ici
entQual i
tyAssur
anceTechniques:I
mpl ement at
ionof
ef
fecti
vequali
tyassurancetechni
quesprovest
obeef fi
cienti
ndet ect
ing
andpat chi
ngtheexist
ingvul
nerabi
li
ti
esandensuresnor oom forthem.
Practi
cesEff
ect
iveCyberDef enceSt
rat
egies:Mit
igateri
skand
vulner
abil
i
tyoccurr
enceratebyi mpl
ementingmul t
ipl
edefensi
vet
actics,
soincaseonelayerofdefensedidn’
tworkanotherlayeri
sinpl
aceto
el
iminatethesecuri
tydef
ectri
sk.
Fuzzt
est
ing,sourcecodeaudi
ts,
and
penetr
ationtest
ingcanallbeconsi
der
edeffecti
vecyberdef
ense
st
rat
egi
es.
AdheretoPrinci
ples:Ef
fect
ivel
yexecuteanyprocesswi
ththeminimum
possi
blesetofpri
vil
egestoaccompl i
shanytask.Anyot
herpermission
shoul
dbegr antedfortheleastamountofti
met ocomplet
et heprivil
eged
j
ob,whichult
imatelyreducesthechanceforathreatact
ortoexecute
arbi
tr
arycodedur i
ngpr i
vil
egedtaskcomplet
ion.
F ol
l
ow t
heprinci
plesl
ik
e
Crypt
ography,SecureCommuni cation,
andSecuredDatabases.
PayAttenti
ont oDataSanit
izat
ion:Sanit
izeallthedataandinf
ormati
on
posttr
ansferr
ingthem t
oothercompl exsubsyst ems,f
orex
ample,
commandshel l
s,COTS(commer ci
al-of
f-the-shell
s)components,
and
rel
ati
onaldatabases.
WhyChooseKr
ati
kalf
orSecur
eCodeRevi
ew?
Kr
ati
kali
saCERT-In-empanell
edcompanyt hatpr
ovi
desful
l
-scale
i
nfor
mationsecur
itysol
uti
onsandser
vices.
BeingI
ndi
a’soneoftheleadi
ng
cyber
secur
it
yfi
rms,
wecommi
ttopr
ovi
dingpr
otect
iont
obusi
nesses
againstcyberthr
eat
s.Weprovi
decutti
ng-edgenet wor
ksecur
it
ytest
ing
ser
vicesinordertomakeor
ganizat
ionsfool
prooft
hroughourproact
ive
approach.
Krat
ikalgi
vesarangeofVAPTser vi
ces,
forinst
ance, secur
ecoder evi
ew,
web/ mobil
eappli
cationtesti
ng,networksecuri
tytesti
ng,cloudpenetr
ati
on
test
ing,I
oT&medi caldevicetest
ing,al
ongwi thaudi t
ingf
orStandard&
Regul
ator
ycompl
i
ance.
Asacompany,
wecur
rent
lyi
nvol
ve600+SMEs
and1
50+maj
orbr
andsacr
osst
hegl
obe.
1.
Wepossessover250+week softest
ingexper
ienceandrendercyber
solut
ionsandser
vicest
oindust
ri
eslik
eTelecom,Fi
ntech,
BFSI
,Govt.
,
Heal
thcar
e,SaaS,
andmanymor
e.
2.Kr
ati
kalhasmar kedagl
obalpr
esencebyser
ving600+SMEsand1
50+
l
argeenterpr
ises.
3.
Krat
ikalhasanex
cel
l
entbusi
nesspr
ofi
l
eandper
for
mance.
4.Weareoneoft
heleadingcybersecuri
tycompani
esinI
ndi
aandhave
baggedarangeofawards,Cer
ti
fi
cationsandrecei
vedst
andar
d
r
ecogni
ti
on.
Cont
actUs
ForSer
vices:
sal
es@k
rat
ikal
.
com
+9192891
9221
0
OurL
ocat
ions:
ThankYou!