Bookmark these ultimate learning resources for Secure Coding
π Get a good grip on Secure Coding with these learning resources π
Secure coding is critical for building resilient software and protecting systems against vulnerabilities. Hereβs a list of top resources for mastering secure coding and secure code reviews to aid your journey.
These are the learning resources that I referred to while learning and performing secure code design and reviews.
Secure Coding Learning References
- Introduction to secure coding: http://www.opensecuritytraining.info/IntroSecureCoding.html
- Secure code review: http://www.opensecuritytraining.info/SecureCodeReview.html
- OWASP Code Review Guide v2: https://www.owasp.org/images/5/53/OWASP_Code_Review_Guide_v2.pdf
- Secure coding practice guidelines: https://security.berkeley.edu/secure-coding-practice-guidelines
- Secure coding from Cybrary: https://www.cybrary.it/course/secure-coding/
- Common API Security pitfalls: https://vimeo.com/289491341
- HTTPs for developers: https://www.youtube.com/watch?v=aE0DJy_qGW8
- Micro-services, letβs secure them: https://www.youtube.com/watch?v=EDLCfTLEeJU
- OAuth, OpenID connect for microservices: https://www.youtube.com/watch?v=BdKmZ7mPNns
- OAth and OpenID connect in plain English: https://www.youtube.com/watch?v=996OiexHze0
- OAuth2.0, overview: https://www.youtube.com/watch?v=CPbvxxslDTU
- Nut & Bolts of API Security: https://www.youtube.com/watch?v=tj03NRM6SP8
- Web Security Fundamentals course from edx: https://courses.edx.org/courses/course-v1:KULeuvenX+WEBSECx+3T2017/course/
- SSL and HTTPS from MIT: https://www.youtube.com/watch?v=q1OF_0ICt9A
- GitLab security secure coding page: https://about.gitlab.com/handbook/engineering/security/secure-coding-training.html
- Secure Coding Guide by Apple: https://developer.apple.com/library/archive/documentation/Security/Conceptual/SecureCodingGuide/Introduction.html#//apple_ref/doc/uid/TP40002477-SW1
- Secure by design principles by UK Government, Security: https://www.security.gov.uk/policy-and-guidance/secure-by-design/principles/
Secure Coding PDFs:
- https://resources.docs.salesforce.com/latest/latest/en-us/sfdc/pdf/secure_coding.pdf
- https://www.cs.montana.edu/courses/csci476/topics/secure_coding_principles.pdf
- https://www.riscure.com/uploads/2020/03/Secure_Coding_Fundamentals_2020.pdf
- https://infosec.byu.edu/https:/brightspotcdn.byu.edu/14/01/8f3a1be2450d9200c6e1ab9d9942/csr-and-dev-man-intro-to-the-secure-development-training-program.pdf
- JavaScript Secure Coding: https://compliance.qcert.org/sites/default/files/library/2020-10/CDP-%20NIAF-SSQA-JSSCS%20-V1.1%20%28JavaScript_Coding_Standard%29_0.pdf
- Secure Coding with Python: https://belitsoft.com/assets/python-security.pdf
- From Secure Coding to Secure Software: https://resources.sei.cmu.edu/asset_files/webinar/2016_018_100_483661.pdf
- CERT Secure Coding Standards: http://www.open-std.org/jtc1/sc22/wg23/docs/ISO-IECJTC1-SC22-WG23_N0023-Secure-Coding-Standards.pdf
5 useful resources to start learning secure code review:
- https://www.veracode.com/security/secure-code-review
- https://www.owasp.org/index.php/Secure_Code_Review_Guide
- https://resources.infosecinstitute.com/secure-code-review-process-guidelines/
- https://searchsecurity.techtarget.com/definition/secure-code-review
- https://www.acunetix.com/blog/articles/secure-code-review-process/
Bugcrowd YouTube videos for API security:
Security Checklist
- Node.js security checklist: https://blog.risingstack.com/node-js-security-checklist/
- Application Threat Modeling: https://www.owasp.org/index.php/Application_Threat_Modeling
Here are some more Secure Coding guidelines references
- Secure Coding Cheat Sheet β OWASP
- Hints for writing secure code | Java Code Geeks
- OWASP Java Table of Contents β OWASP
- Category:OWASP Enterprise Security API β OWASP
- Overview (ESAPI 2.0.1 API)
- Secure SDLC Cheat Sheet β OWASP
- Blocking Brute Force Attacks β OWASP
- HTTP Response Splitting β OWASP
- Category:Java β OWASP
- Session Timeout β OWASP
- Java Security Resources β OWASP
- Core Security Patterns β Ramesh Nagappan CISSP, Chris Steel CISSP and Ray Lai
- Java 2 Platform Security | Java Security Architecture
- SEI CERT Oracle Coding Standard for Java β CERT Oracle Coding Standard for Java β CERT Secure Coding Standards
- Rule 14. Serialization (SER) β CERT Oracle Coding Standard for Java β CERT Secure Coding Standards
- Guidelines for Java Developers (Ch. 7, Sec. 1) [Securing Java]
- Penetration Testing Tools :: Collections :: Add-ons for Firefox
- Error Handling, Auditing and Logging β OWASP
- https://software-security.sans.org/2009/05/25/logging-cookies-in-apache/
- Getting Started with the Force.com REST API β developer.force.com
- Session Management Cheat Sheet β OWASP
- Reviewing Code for Session Integrity issues β OWASP
- DefaultHTTPUtilities.java β owasp-esapi-java β OWASP Enterprise Security API (Java Edition) β Google Project Hosting
- 5 tips to fight session hijacking for web applications β Java EE Development Blog
- Java Secure JEE Training | Secure Coding Training | Application Security
- https://www.sans.org/reading-room/whitepapers/application/attacks-oauth-secure-oauth-implementation-33644
- Finding Additional Resources | Force.com REST API Developerβs Guide | Salesforce Developers
- Security Code Review in the SDLC β OWASP
- Category:Code Snippet β OWASP
- OWASP Code Review Guide Table of Contents β OWASP
- Searching for Code in J2EE/Java β OWASP
- Java leading security practice β OWASP
- Java gotchas β OWASP
- Reviewing Web Services β OWASP
- The Owasp Code Review Top 9 β OWASP
- Rule 17. Java Native Interface (JNI) β CERT Oracle Coding Standard for Java β CERT Secure Coding Standards
- Projects/OWASP Secure Coding Practices β Quick Reference Guide/Releases/SCP v2 β OWASP
- OWASP Secure Coding Practices β Quick Reference Guide β OWASP
- StuHunt.com | Offer Details
- StuHunt.com | Offer Details
- Measure Resource Loading Times | Web Tools β Google Developers
- Java Coding Guidelines β CERT Oracle Coding Standard for Java β CERT Secure Coding Standards
- ZAProxy Plugin β Jenkins β Jenkins Wiki
- Secure Coding Guidelines for Java SE
- Secure Coding Guidelines for the Java Programming Language, Version 3.0 (Sean Mullanβs Blog)
- Twelve rules for developing more secure Java code | JavaWorld
- Rule 00. Input Validation and Data Sanitization (IDS) β CERT Oracle Coding Standard for Java β CERT Secure Coding Standards
- Intro to Pipeline Security β Jenkins (1/3) β breakFix
- Jersey 2.22.1 User Guide
- Best Practices for Designing a Pragmatic RESTful API | Vinay Sahni
- 10 Steps to Secure Software β DZone Web Dev
- Getting Started With RetroPie β DZone IoT
- Understandβ’ Static Code Analysis Tool | SciTools.com
- Customers | SciTools.com
- https://d1dejaj6dcqv24.cloudfront.net/videos/2013/qualysguard/web-application-scanning/qualysguard-was-crawl-settings-selenium/qualysguard-was-crawl-settings-selenium β Broadband.m4v
- Security HTTP Response Headers
- Best Practices for Mobile Application QA in an Agile Environment β Recorded Webinar by Experitest &Syntel
- Security: Secure Internet Data Transmission.
- Threat Risk Modeling β OWASP
- Secure Coding Guidelines for Java SE
- NIST.gov β Computer Security Division β Computer Security Resource Center
- PowerPoint Presentation
- HTTPUtilities (ESAPI 2.0.1 API)
- HTTP Authentication: www.ietf.org/rfc/rfc2617.txt
- WebDAV β Wikipedia, the free encyclopedia
- Top 10 Coding Guidelines for Java | CERT NEWS
- Generating Amazon S3 Pre-signed URLs with SSE (Part 1) | AWS Developer Blog
- Security Functions | Security Question | HackerRank
- amazon s3 β What is the purpose of the expiration time in signed S3 urls? β Information Security Stack Exchange
- 9 Software Security Design Principles β DZone Java
- Email, website and IP spoofing: How to prevent a spoofing attack
- Security HTTP Response Headers
Summary:
Stay consistent and incorporate these practices into daily development. Remember, Security is everyoneβs responsibility!
A Request: Have other great resources or tips? Drop them in the comments!
#SecureCoding #ApplicationSecurity #APISecurity #Cybersecurity
Connect with me for cybersecurity articles: