The Path to a Secure Application: A Source Code Security Review Checklist
Integrating source code vulnerability testing into your software development life cycle practices significantly reduces the likelihood of security flaws. Read this white paper to learn the path to find and eliminate coding errors and design flaws that expose data, threaten operations, and cost your organization time and money.
This white paper details of the five major categories of vulnerability and an actionable source code security review checklist for the following areas:
- Security-related functions
- Input/Output validation and encoding errors
- Error handling and logging vulnerabilities
- Insecure Components
- Coding errors
Chief Scientist and Co-Founder, Ounce Labs
Ryan Berg is Chief Scientist and a Co-Founder of Ounce Labs. In addition to advancing the state of the art in application security technologies, Ryan is also a popular speaker, instructor, and author, in the fields of security, risk management, and secure development processes. He holds patents and has patents pending in multi-language security assessment, kernel-level security, intermediary security assessment language, and secure remote communication protocols.
- Ounce Labs, an IBM Company
- 05 Feb 2007
- 01 Feb 2007
- White Paper