OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
Session management
Use the server or framework’s session
management controls. The application should
recognize only these session identifiers as valid
Access control
Use only trusted system objects, e.g. server
side session objects, for making access
authorization decisions
Use a single site-wide component to check
access authorization. This includes libraries that
call external authorization services
Cryptographic practices
All cryptographic functions used to protect
secrets from the application user must be
implemented on a trusted system
Data protection
Implement least privilege, restrict users to only
the functionality, data and system information
that is required to perform their tasks
Protect all cached or temporary copies of
sensitive data stored on the server from
unauthorized access and purge those temporary
working files a soon as they are no longer
required.
Communication security
Implement encryption for the transmission of
all sensitive information. This should include TLS
for protecting the connection and may be
supplemented by discrete encryption of sensitive
files or non-HTTP based connections
System configuration
Ensure servers, frameworks and system
components are running the latest approved
version
Database security
Use strongly typed parameterized queries
File management
Do not pass user supplied data directly to any
dynamic include function
Memory management
Utilize input and output controls for untrusted
data
\newpage
Edit on GitHub
Spotlight: Approach Cyber
Approach Cyber is a pure-play cyber security and privacy company. At Approach, we believe
that everyone deserves digital peace-of-mind. This is our vision, our aspiration for a society
where each and every one is reassured, where there is confidence and security in the digital
world. Therefore, our role is to bring cyber serenity to society. Every day, we take care of your
cybersecurity while you focus on your business. We help you to prevent, withstand and
recover from cyber security incidents and enable you to keep full attention on your core
activities.
Corporate Supporters
OWASP, the OWASP logo, and Global AppSec are registered trademarks and AppSec Days, AppSec
California, AppSec Cali, SnowFROC, and LASCON are trademarks of the OWASP Foundation, Inc. Unless
otherwise specified, all content on the site is Creative Commons Attribution-ShareAlike v4.0 and provided
without warranty of service or accuracy. For more information, please refer to our General Disclaimer.
OWASP does not endorse or recommend commercial products or services, allowing our community to
remain vendor neutral with the collective wisdom of the best minds in software security worldwide. Copyright
2023, OWASP Foundation, Inc.