This white paper provides 13 tips for writing secure applications on IBM i servers to help boost security. It discusses the importance of documentation, segregating libraries, controlling object ownership, designing secure databases, using authorization lists, adopting authority and profile swapping, securing exit points, planning for high availability, and restricting query tools. The goal is to empower programmers to enhance security rather than undermine it, as everyone shares responsibility for security, and many breaches occur due to poorly configured systems and applications that lack security considerations.