From the course: Programming Foundations: Secure Coding

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

File and I/O

File and I/O

- The file system can be a dangerous place for applications, and bad actors love to leverage it to find exploits. Attacks on the file system can be relatively easy to exploit, so it's a great arena for new attackers. Furthermore, the results can be devastating to the systems involved. As we look at the risk management profile, the ease of attack in conjunction with the damage potential indicates a clear need to take these seriously. Now there are several areas we need to focus on with the file system as well as file input and output. The first we will discuss is often more infrastructure-focused, but in a DevOps world, that line is very blurred. You need to ensure your application is run in a user process that is controlled. You should only provide access to the file system to that user that the application needs in order to run. This is often considered in server-side applications, especially in the Linux world, but the same cannot be said for desktop or mobile applications. While…

Contents