SlideShare a Scribd company logo
2
Most read
4
Most read
9
Most read
5 Important Secure Coding
Practices
Let’s begin
Almost all organisations have coding standards deployed to ensure the uniformity of coding across
projects. It is equally important to have secure coding practices as well.
These secure coding practices will help to minimise the exposure to security vulnerabilities.
Security practices shall be integrated to the entire SDLC phases.
5 important secure coding practices
Industry best practices like Microsoft SDL will help to set these processes.
When it comes to secure coding practices, there are lot to be considered.
Here, we will look at the minimum to be considered while developing an application.
5 important secure coding practices
Input Validation
01
Fail safe
03
Authentication &
Access Control
02
Exception handling
04
Adhere to secure
coding standard
05
Let’s look at the important ones
Input Validation
A checklist for validation
will help to implement
these during the
development phase.
Validation of data entered
to the application will
help to avoid issues to a
greater extend.
Ensure that validation is
be done for data length ,
special characters,
numerals in text fields
and vice-versa.
Authentication & Access Control
There should be provision for the following:
• Configure account lockout after defined number of
attempts
• Restriction to re-use passwords which were already
used
Wherever possible, implement
authentication mechanism for the
application.
The application should have the
concept of normal users and admin
(privileged) users.
The application should have a
mechanism to assign access rights to
normal users and privileged users.
The application should have the
provision to assign password
complexity requirements.
01
02
03
04
05
This will ensure that the data
and the application is
protected from unauthorised
exposure (breaches) even
during an unforeseen
situation.
It is fine for an application
to fail, provided it fails in
a safe way.
If the application fails or
terminates abnormally during
a process, there should be a
mechanism to contain it.
Fail safe
Thus ensuring that the
errors or exceptions
doesn’t result in a crash or
freeze.
Exception handling is
important. It is always good if
the program executes as per
the flow or expectations.
But at the same time, it is
equally important to have a
mechanism to handle the
exceptions.
Exception handling
01 02 03
Ensure that the
developers adhere to the
standards as well.
Adopt a coding standard
for the platform/language
used to develop the
application.
The developers should
be trained on these
standard.
Adhere to secure coding standard
01 02 03
Thomas Kurian Ambattu
CRISC, ISO27001 LA, ISLA-2011 (ISC2)

More Related Content

PDF
Secure coding presentation Oct 3 2020
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PPT
Introduction To OWASP
PPTX
Secure coding practices
PPTX
Secure coding practices
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
PPTX
Owasp top 10 vulnerabilities
Secure coding presentation Oct 3 2020
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 2021 Presentation (Jul 2022)
Introduction To OWASP
Secure coding practices
Secure coding practices
Secure Coding 101 - OWASP University of Ottawa Workshop
Owasp top 10 vulnerabilities

What's hot (20)

PDF
Secure Code Review 101
PDF
Introduction to Software Security and Best Practices
PPT
Introduction to Web Application Penetration Testing
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PDF
Mobile Application Security
PPTX
Vulnerabilities in modern web applications
ODP
OWASP Secure Coding
PDF
Secure coding guidelines
PPT
End User Security Awareness Presentation
PDF
Cybersecurity Employee Training
PDF
Insecure direct object reference (null delhi meet)
PPT
Secure code practices
PPTX
Cybersecurity Awareness Training
PPT
authentication.ppt
PDF
OWASP API Security Top 10 - API World
PPTX
OWASP Top 10 2021 What's New
PDF
Sql Injection - Vulnerability and Security
PPT
Web Application Security Testing
PDF
14 tips to increase cybersecurity awareness
PPT
IT Security management and risk assessment
 
Secure Code Review 101
Introduction to Software Security and Best Practices
Introduction to Web Application Penetration Testing
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Mobile Application Security
Vulnerabilities in modern web applications
OWASP Secure Coding
Secure coding guidelines
End User Security Awareness Presentation
Cybersecurity Employee Training
Insecure direct object reference (null delhi meet)
Secure code practices
Cybersecurity Awareness Training
authentication.ppt
OWASP API Security Top 10 - API World
OWASP Top 10 2021 What's New
Sql Injection - Vulnerability and Security
Web Application Security Testing
14 tips to increase cybersecurity awareness
IT Security management and risk assessment
 
Ad

Similar to 5 Important Secure Coding Practices (20)

PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
PPTX
secure coding techniques unit-iii material
PDF
Importance of Secure Coding with it’s Best Practices
PPTX
Building an AppSec Team Extended Cut
PPTX
Mike Spaulding - Building an Application Security Program
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PDF
What is Secure Code Review and Its Process.pdf
PDF
Security Considerations in Codeless Automation Testing.pdf
PDF
Selecting an App Security Testing Partner: An eGuide
PDF
Procuring an Application Security Testing Partner
PDF
Best Practices for Developing Secure Web Applications
DOCX
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
PPT
Software coding and testing
PDF
10 Steps To Secure Agile Development
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PDF
Security is our duty and we shall deliver it - White Paper
10 Tips to Keep Your Software a Step Ahead of the Hackers
secure coding techniques unit-iii material
Importance of Secure Coding with it’s Best Practices
Building an AppSec Team Extended Cut
Mike Spaulding - Building an Application Security Program
Project Quality-SIPOCSelect a process of your choice and creat.docx
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
What is Secure Code Review and Its Process.pdf
Security Considerations in Codeless Automation Testing.pdf
Selecting an App Security Testing Partner: An eGuide
Procuring an Application Security Testing Partner
Best Practices for Developing Secure Web Applications
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Software coding and testing
10 Steps To Secure Agile Development
I am sharing 'unit 4' with youuuuuu.PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
Security is our duty and we shall deliver it - White Paper
Ad

Recently uploaded (20)

PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Digital Strategies for Manufacturing Companies
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ai tools demonstartion for schools and inter college
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Transform Your Business with a Software ERP System
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Introduction to Artificial Intelligence
Operating system designcfffgfgggggggvggggggggg
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Navsoft: AI-Powered Business Solutions & Custom Software Development
Digital Strategies for Manufacturing Companies
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
How to Migrate SBCGlobal Email to Yahoo Easily
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
How to Choose the Right IT Partner for Your Business in Malaysia
Design an Analysis of Algorithms II-SECS-1021-03
ai tools demonstartion for schools and inter college
CHAPTER 2 - PM Management and IT Context
VVF-Customer-Presentation2025-Ver1.9.pptx
Transform Your Business with a Software ERP System
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Adobe Illustrator 28.6 Crack My Vision of Vector Design
How Creative Agencies Leverage Project Management Software.pdf
Introduction to Artificial Intelligence

5 Important Secure Coding Practices

  • 1. 5 Important Secure Coding Practices Let’s begin
  • 2. Almost all organisations have coding standards deployed to ensure the uniformity of coding across projects. It is equally important to have secure coding practices as well. These secure coding practices will help to minimise the exposure to security vulnerabilities. Security practices shall be integrated to the entire SDLC phases. 5 important secure coding practices
  • 3. Industry best practices like Microsoft SDL will help to set these processes. When it comes to secure coding practices, there are lot to be considered. Here, we will look at the minimum to be considered while developing an application. 5 important secure coding practices
  • 4. Input Validation 01 Fail safe 03 Authentication & Access Control 02 Exception handling 04 Adhere to secure coding standard 05 Let’s look at the important ones
  • 5. Input Validation A checklist for validation will help to implement these during the development phase. Validation of data entered to the application will help to avoid issues to a greater extend. Ensure that validation is be done for data length , special characters, numerals in text fields and vice-versa.
  • 6. Authentication & Access Control There should be provision for the following: • Configure account lockout after defined number of attempts • Restriction to re-use passwords which were already used Wherever possible, implement authentication mechanism for the application. The application should have the concept of normal users and admin (privileged) users. The application should have a mechanism to assign access rights to normal users and privileged users. The application should have the provision to assign password complexity requirements. 01 02 03 04 05
  • 7. This will ensure that the data and the application is protected from unauthorised exposure (breaches) even during an unforeseen situation. It is fine for an application to fail, provided it fails in a safe way. If the application fails or terminates abnormally during a process, there should be a mechanism to contain it. Fail safe
  • 8. Thus ensuring that the errors or exceptions doesn’t result in a crash or freeze. Exception handling is important. It is always good if the program executes as per the flow or expectations. But at the same time, it is equally important to have a mechanism to handle the exceptions. Exception handling 01 02 03
  • 9. Ensure that the developers adhere to the standards as well. Adopt a coding standard for the platform/language used to develop the application. The developers should be trained on these standard. Adhere to secure coding standard 01 02 03
  • 10. Thomas Kurian Ambattu CRISC, ISO27001 LA, ISLA-2011 (ISC2)