Secure Software Development Practices

Which of the following is NOT a secure coding practice?

While open-sourcing software is a good method for providing consumers with trust and transparency, it is not necessarily a secure coding practice to follow. Open-sourcing software exposes it to the public web, and a threat actor could use this to research vulnerabilities with the intent of exploiting them.
View Options Again

Understanding Secure Development Practices

Threat Modeling

Is the following statement True or False:
Threat modeling helps prioritize security risks based on their likelihood and potential impact.

Threat modeling helps prioritize security risks based on their likelihood and potential impact. By assessing the risks associated with identified threats, developers can allocate resources effectively and focus on addressing the most critical vulnerabilities. This helps teams to make informed decisions about controls and mitigation strategies.
View Options Again

Coding Practices

Is the following statement True or False:
If your intended users are trusted, it's not necessary to validate and sanitize input.

The importance of validating and sanitizing all user input received by a system can't be emphasized enough. Input from a user should always be considered untrusted, particularly as software and applications have a tendency to grow and evolve. A function that may never have been intended for untrusted users, may be exposed by an unknowing team member years after initial development.
View Options Again

Compliance

If deploying software in the cloud, what is a security capability to consider?

When deploying software in the public cloud, it's recommended to consider deploying cloud configuration management, identity security, and workload protection capabilities to provide baseline protections.
View Options Again

Collaboration & Testing

Is the following statement True or False:
Collaboration is only necessary if you're developing complex software.

Collaboration is essential not only for identifying security issues but also for identifying design flaws whereby business requirements may not be met. By collaborating between teams, developers can gain a fresh perspective on whether the software being developed will meet end-user needs.
View Options Again

Wrapping up