Secure Coding Practices Quick Ref 5
Secure Coding Practices Quick Ref 5
Secure Coding Practices Quick Ref 5
Project leader
Keith Turpin
[email protected]
OWASP
October, 2010
OWASP 2
Some Background
OWASP 3
Guide Overview
OWASP 4
Sections of the Guide
Table of contents
Introduction
OWASP 6
Checklist Practices
OWASP 7
Extract - Database Security
Use strongly typed parameterized queries
Utilize input validation and output encoding and be sure to address meta characters. If
these fail, do not run the database command
Ensure that variables are strongly typed
The application should use the lowest possible level of privilege when accessing the
database
Use secure credentials for database access
Do not provide connection strings or credentials directly to the client. If this is
unavoidable, encrypted them
Use stored procedures to abstract data access
Close the connection as soon as possible
Remove or change all default database administrative passwords. Utilize strong
passwords/phrases or implement multi-factor authentication
Turn off all unnecessary database functionality (e.g., unnecessary stored procedures
or services, utility packages, install only the minimum set of features and options
required (surface area reduction))
OWASP 8
Using the guide
Scenario #1: Developing Guidance Documents
Coding Practices
OWASP 9
Using the guide continued
Coding Practices
OWASP 10
Using the guide continued
Scenario #3: Contracted Development
Identify security requirements to be added to outsourced
software development projects.
Include them in the RFP and Contract
RFP
Best
Contract
Software
Best
Ever
Software
Ever
OWASP 12
A Secure Development Framework
Guidance on implementing a secure software development framework
is beyond the scope of the Quick reference Guide, however the
following OWASP projects can help:
OWASP 13
Questions
OWASP 14