SlideShare a Scribd company logo
Principle – Minimize Attack Surfaces
More points
of interaction
More difficult
to defend
1 of 10
Principle – Establish Secure Defaults
vs.
Never rely on someone needing
to specially configure or enable
basic security functionality.
2 of 10
Principle – Least Privilege
Not everyone should have access
to everything.
Even people or accounts you
might think should have access
don’t always need it.
3 of 10
Principle – Defense in Depth
Don’t rely on a single security
method to protect everything.
Layer basic security practices
to ensure the overall safety of
an application.
4 of 10
Principle – Fail Securely
Security controls should be
designed to fail until they are
proven valid.
5 of 10
When a security control does
fail, it should place the
application in a secure state.
Principle – Don’t Trust Services
Don’t make assumptions that
can impact your application’s
security goals.
6 of 10
Principle – Separation of Duties
Some combinations of permissions don’t work
well together.
7 of 10
Principle – Avoid Security by Obscurity
“But an attacker would never know or see that!”
8 of 10
Principle – Keep Security Simple
The simpler the design of the security,
the easier it is to understand and
implement correctly.
vs.
9 of 10
Principle – Fix Security Issues Correctly
Symptom
The real problem
10 of 10

More Related Content

PPTX
PPTX
Understanding the 8 Keys to Security Success
PDF
The New Economics of Cloud Security
PDF
Security is a process not a magic
PPTX
Seven security principles
PDF
5 Essential Security Tips for Startups
PDF
10 Ways to Guarantee At Data Security Breach in 12-Months
PDF
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Understanding the 8 Keys to Security Success
The New Economics of Cloud Security
Security is a process not a magic
Seven security principles
5 Essential Security Tips for Startups
10 Ways to Guarantee At Data Security Breach in 12-Months
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.

What's hot (19)

PPTX
How to Avoid End-of-Life Software Pitfalls
PDF
Accelerating Incident Response in Organizations of Any Size
PPTX
5 insider tips for using it audits to maximize security
PDF
5 Data Security Measures
PPTX
Information Security Life Cycle
PDF
The State of Network Security 2014
PDF
Managing Security Policies Across Hybrid Cloud Environments
PDF
False alarms
PDF
Mastering next gen-siem-usecases-part1
PDF
Reliability teamwork
PDF
5 Essential Security Tips for Startups
PDF
BGA Eğitim Kataloğu
PDF
7-lessons-learned-from-bsimm
PPTX
How to Choose the Right Security Training for You
PDF
False alarms
PPTX
New Synopsys research uncovers security's biggest challenges
PDF
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
PDF
Sonoco Safety Leadership Principles 2014
How to Avoid End-of-Life Software Pitfalls
Accelerating Incident Response in Organizations of Any Size
5 insider tips for using it audits to maximize security
5 Data Security Measures
Information Security Life Cycle
The State of Network Security 2014
Managing Security Policies Across Hybrid Cloud Environments
False alarms
Mastering next gen-siem-usecases-part1
Reliability teamwork
5 Essential Security Tips for Startups
BGA Eğitim Kataloğu
7-lessons-learned-from-bsimm
How to Choose the Right Security Training for You
False alarms
New Synopsys research uncovers security's biggest challenges
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Sonoco Safety Leadership Principles 2014
Ad

Similar to 02 application security fundamentals - part 1 - security priciples (20)

PDF
Principles for Secure Design and Software Security
PPTX
Security Design Principles for developing secure application .pptx
PPTX
002 Security Design Principles and some other
PPTX
002 Security Design Principles with best
PPT
Survey Presentation About Application Security
PPT
Security Design Principles.ppt
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
Secure by Design - Security Design Principles for the Working Architect
ODP
Break it while you make it: writing (more) secure software
PPTX
Security Design Concepts
PPTX
For Business's Sake, Let's focus on AppSec
PDF
Streamlining AppSec Policy Definition.pptx
PPTX
Application Security: What do we need to know?
PPTX
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
PDF
Application Security Protecting Your Software.pdf
 
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPT
its a computer security based ppt which is very useful
PPT
Intro to-ssdl--lone-star-php-2013
PPTX
Web Application Hacking tools .pptx
Principles for Secure Design and Software Security
Security Design Principles for developing secure application .pptx
002 Security Design Principles and some other
002 Security Design Principles with best
Survey Presentation About Application Security
Security Design Principles.ppt
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Working Architect
Break it while you make it: writing (more) secure software
Security Design Concepts
For Business's Sake, Let's focus on AppSec
Streamlining AppSec Policy Definition.pptx
Application Security: What do we need to know?
01 Application Security Fundamentals - part 1 - introduction and goals
Application Security Protecting Your Software.pdf
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
its a computer security based ppt which is very useful
Intro to-ssdl--lone-star-php-2013
Web Application Hacking tools .pptx
Ad

More from appsec (11)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
04 application security fundamentals - part 2 - security mechanisms - authe...
05 application security fundamentals - part 2 - security mechanisms - autho...

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf

02 application security fundamentals - part 1 - security priciples

  • 1. Principle – Minimize Attack Surfaces More points of interaction More difficult to defend 1 of 10
  • 2. Principle – Establish Secure Defaults vs. Never rely on someone needing to specially configure or enable basic security functionality. 2 of 10
  • 3. Principle – Least Privilege Not everyone should have access to everything. Even people or accounts you might think should have access don’t always need it. 3 of 10
  • 4. Principle – Defense in Depth Don’t rely on a single security method to protect everything. Layer basic security practices to ensure the overall safety of an application. 4 of 10
  • 5. Principle – Fail Securely Security controls should be designed to fail until they are proven valid. 5 of 10 When a security control does fail, it should place the application in a secure state.
  • 6. Principle – Don’t Trust Services Don’t make assumptions that can impact your application’s security goals. 6 of 10
  • 7. Principle – Separation of Duties Some combinations of permissions don’t work well together. 7 of 10
  • 8. Principle – Avoid Security by Obscurity “But an attacker would never know or see that!” 8 of 10
  • 9. Principle – Keep Security Simple The simpler the design of the security, the easier it is to understand and implement correctly. vs. 9 of 10
  • 10. Principle – Fix Security Issues Correctly Symptom The real problem 10 of 10