SlideShare a Scribd company logo
Security checklist
for Web Developers
Lidiia ‘Alice’ Skalytska
OWASP Kyiv 2017
Software
development
lifecycle
Secure
Software
development
lifecycle
Planning
Analyze
your
application
threat
modeling
user interface
flaws
data
presentation
flaws
Usability
create
applications
that users
understand and
like to use
Security
incident
plan
build security
incident plan.
One day, you
will need it.
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Development / Implementation
Authentication Database
Input / output
/ validate
Web Traffic Logs
The 3rd party
components
Authentication
Use Facebook /
Google / etc. Login
Use multi-factor
authentication
Implement Proper
Password Strength
Controls
Ensure all
passwords are
hashed
Implement Secure
Password Recovery
Mechanism
Never write your
own crypto
Prevent Brute-
Force Attacks
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Database
Access control
Use minimal
privilege user
account
If you can use
crypto, use it!
Store backups
in other
place(s)
Encrypt
backups
Input /
Output /
Validate
Client-side and
server-side input
validation
Always validate and
encode user input
before displaying
Never use
untrusted user
input
Input data is always
suspect
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Web Traffic
TLS
Use TLS for
the entire
site
Cookies
Cookies must
be httpOnly
and secure
HSTS
Use HSTS
responses
Logs
All user account
management
activity
Every access
control related
events
Application errors
and system events
Changes to
application
configuration
settings
You need readable
logs (who? when?
where?)
The 3rd party components
Libraries
• internally or externally
• keep them small
• check vendor reputation
APIs
• use a special key to access
• testing inputs and outputs
• check vendor reputation
Microservices
• each microservice is
separate
• use JSON
• use TLS
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Testing
1
Create a
testing plan
2
Audit your
design and
implementation
3
Do penetration
testing 
4
Think like a
hacker
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Resume
Planning
Development
Testing
Questions?
Security checklist
for Web Developers
alice.bizarius@gmail.com
securit13podcast@gmail.com
http://securit13.libsyn.com/
@alice_kaifat

More Related Content

PPTX
Automatically detecting security vulnerabilities in WordPress
PPTX
Security Testing - A complete Guide
PPTX
8 must dos for a perfect privileged account management strategy
PDF
Web Sec Auditor
PPTX
IT security : Keep calm and monitor PowerShell
PPTX
Secure Code Warrior - Remote file inclusion
PPT
Top Keys to create a secure website
PPTX
Application security [appsec]
Automatically detecting security vulnerabilities in WordPress
Security Testing - A complete Guide
8 must dos for a perfect privileged account management strategy
Web Sec Auditor
IT security : Keep calm and monitor PowerShell
Secure Code Warrior - Remote file inclusion
Top Keys to create a secure website
Application security [appsec]

What's hot (20)

PDF
Setting up a cost effective Application Security program from scratch by Tusn...
PDF
Ajax Fingerprinting Filtering Wth Mod Security2
PPTX
Secure Code Warrior - Cross site scripting
PPTX
PPT
Web Application Security
PPTX
OWASP -Top 5 Jagjit
PPTX
Sql injection
PPTX
Overview of RateSetter web security
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PDF
What Should Go Into A Web Application Penetration Testing Checklist?
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PPTX
Abusing Google Apps and Data API: Google is My Command and Control Center
PPTX
Secure Code Warrior - Os command injection
PPTX
Introduction to OWASP
PPTX
Secure Code Warrior - Authentication
PPTX
Windows 8 programming with html and java script
PPTX
What not to do with ASP NET
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Setting up a cost effective Application Security program from scratch by Tusn...
Ajax Fingerprinting Filtering Wth Mod Security2
Secure Code Warrior - Cross site scripting
Web Application Security
OWASP -Top 5 Jagjit
Sql injection
Overview of RateSetter web security
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
What Should Go Into A Web Application Penetration Testing Checklist?
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Abusing Google Apps and Data API: Google is My Command and Control Center
Secure Code Warrior - Os command injection
Introduction to OWASP
Secure Code Warrior - Authentication
Windows 8 programming with html and java script
What not to do with ASP NET
Reducing Risk of Credential Compromise at Netflix
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ad

Similar to Lidiia 'Alice' Skalytska - Security Checklist for Web Developers (20)

PDF
C01461422
PDF
Scalable threat modelling with risk patterns
PDF
Become a Security Ninja
PPT
Developing Secure Applications and Defending Against Common Attacks
PDF
Threat modeling with architectural risk patterns
PDF
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
PDF
Mobile Enterprise Application Platform
PDF
Web application security (eng)
PDF
Best Practices for Secure Web Application Development by Site Invention.pdf
PDF
Flutter App Development Best Practices: 10 Essential Security Measures
PDF
Security As A Service
PPT
Securing Your .NET Application
PPTX
7 Step Checklist for Web Application Security.pptx
PDF
Best Practices for Developing Secure Web Applications
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
PDF
How to Build a Secure Java Web Application.pdf
PPTX
00. introduction to app sec v3
PPT
Mobile application security Guidelines
PDF
Web Application Penetration Testing Course in 2025.pdf
PDF
OWASP Top 10 List Overview for Web Developers
C01461422
Scalable threat modelling with risk patterns
Become a Security Ninja
Developing Secure Applications and Defending Against Common Attacks
Threat modeling with architectural risk patterns
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Mobile Enterprise Application Platform
Web application security (eng)
Best Practices for Secure Web Application Development by Site Invention.pdf
Flutter App Development Best Practices: 10 Essential Security Measures
Security As A Service
Securing Your .NET Application
7 Step Checklist for Web Application Security.pptx
Best Practices for Developing Secure Web Applications
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
How to Build a Secure Java Web Application.pdf
00. introduction to app sec v3
Mobile application security Guidelines
Web Application Penetration Testing Course in 2025.pdf
OWASP Top 10 List Overview for Web Developers
Ad

More from OWASP Kyiv (20)

PDF
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
PPTX
Software Supply Chain Security та компоненти з відомими вразливостями
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
PDF
Threat Modeling with OWASP Threat Dragon
PDF
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
PDF
Vlad Styran - Cyber Security Economics 101
PDF
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
PDF
Ivan Vyshnevskyi - Not So Quiet Git Push
PDF
Dima Kovalenko - Modern SSL Pinning
PDF
Yevhen Teleshyk - OAuth Phishing
PDF
Vlada Kulish - Why So Serial?
PDF
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
PDF
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
PDF
Ihor Bliumental - WebSockets
PPTX
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
PDF
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
PPTX
Andriy Shalaenko - GO security tips
PPTX
Vlad Styran - "Hidden" Features of the Tools We All Love
PDF
Volodymyr Ilibman - Close Look at Nyetya Investigation
PDF
Ihor Bliumental - Collision CORS
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
Software Supply Chain Security та компоненти з відомими вразливостями
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Threat Modeling with OWASP Threat Dragon
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Vlad Styran - Cyber Security Economics 101
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
Ivan Vyshnevskyi - Not So Quiet Git Push
Dima Kovalenko - Modern SSL Pinning
Yevhen Teleshyk - OAuth Phishing
Vlada Kulish - Why So Serial?
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
Ihor Bliumental - WebSockets
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
Andriy Shalaenko - GO security tips
Vlad Styran - "Hidden" Features of the Tools We All Love
Volodymyr Ilibman - Close Look at Nyetya Investigation
Ihor Bliumental - Collision CORS

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
A comparative analysis of optical character recognition models for extracting...
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Machine Learning_overview_presentation.pptx
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Lidiia 'Alice' Skalytska - Security Checklist for Web Developers