Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security Testi
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
- Software developers
- Desktop teams
- Database teams
- Infrastructure teams
- Developers follow standardized rules to ensure threat-resistant code.
- Security libraries in frameworks are used for critical tasks, such as:
- Input validation
- Authentication
- Data access
- Involves manual and automated review of source code to uncover security weaknesses.
- Essential checks include:
- Proper logging of security events
- Authentication bypass prevention
- Validation of user input
- Source Code Access: Obtain access to the codebase.
- Vulnerability Review: Identify weaknesses, categorized by risk impact (e.g., financial, reputation).
- Reporting: Remove false positives, document issues, and assess risk severity.
- Remediation: Track and fix vulnerabilities using bug tracking systems like Jira.
- White-box testing that scans source code or binaries without execution.
- Integrates with CI/CD pipelines or developer IDEs for immediate feedback.
- Supports the “shift left” approach, finding vulnerabilities early in the SDLC.
- Tools demonstrated: Coverity, LGTM
- Gray-box testing performed while the application is running, often during functional tests.
- Monitors application activity in real-time and pinpoints exact lines of code needing fixes.
- Advantages:
- Eliminates false positives
- Fits Agile, DevOps, and CI/CD workflows
- Ensure open-source libraries are current and free of known vulnerabilities.
- Can integrate with SAST and IAST tools.
- Resources: OWASP Dependency Check (free tool for detecting vulnerable components).
- Identify poor coding practices, dead code, and potential security issues.
- Improving code quality correlates with enhanced overall security.
- Tools mentioned: SpotBugs, SonarQube
- Secure Build is Phase 4 of the Secure SDLC.
- Integrates practices including:
- Following secure coding standards
- Performing code reviews
- Applying automated testing (SAST & IAST)
- Ensuring component security and code quality
- Goal: Proactively address security during development, rather than remediating later.
Produced by:
https://www.podcaistudio.com/
Todavía no hay opiniones