Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework

Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework

DOI: 

https://doi.org/10.30564/jcsr.v4i2.4048

Abstract

Cybersecurity is a global goal that is central to national security planning in many countries. One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats. The use of a secure software product in a real environment enables the reduction of the vulnerability of the system as a whole. It would be logical to find the most optimal solution for the integration of secure coding in the classic SDLC (software development life cycle). This paper aims to suggest practices and tips that should be followed for secure coding, in order to avoid cost and time overruns because of untimely identification of security issues. It presents the implementation of secure coding practices in software development, and showcases several real-world scenarios from different phases of the SDLC, as well as mitigation strategies. The paper covers techniques for SQL injection mitigation, authentication management for staging environments, and access control verification using JSON Web Tokens.

Keywords: 

Cybersecurity, Security risks, Secure SDLC, SQL injection, Broken authentication, Broken access control, Mitigation practices

Comments

Popular posts from this blog

𝑱𝒐𝒖𝒓𝒏𝒂𝒍 𝒐𝒇 𝑬𝒏𝒗𝒊𝒓𝒐𝒏𝒎𝒆𝒏𝒕𝒂𝒍 & 𝑬𝒂𝒓𝒕𝒉 𝑺𝒄𝒊𝒆𝒏𝒄𝒆𝒔 | 𝑽𝒐𝒍𝒖𝒎𝒆 02 | 𝑰𝒔𝒔𝒖𝒆 02 | 𝑶𝒄𝒕𝒐𝒃𝒆𝒓 2020

𝗝𝗼𝘂𝗿𝗻𝗮𝗹 𝗼𝗳 𝗘𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁𝗮𝗹 & 𝗘𝗮𝗿𝘁𝗵 𝗦𝗰𝗶𝗲𝗻𝗰𝗲𝘀 | 𝗩𝗼𝗹𝘂𝗺𝗲 𝟬𝟲 | 𝗜𝘀𝘀𝘂𝗲 𝟬𝟯 | 𝗢𝗰𝘁𝗼𝗯𝗲𝗿 𝟮𝟬𝟮𝟰

𝐉𝐨𝐮𝐫𝐧𝐚𝐥 𝐨𝐟 𝐀𝐭𝐦𝐨𝐬𝐩𝐡𝐞𝐫𝐢𝐜 𝐒𝐜𝐢𝐞𝐧𝐜𝐞 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡 | 𝐕𝐨𝐥𝐮𝐦𝐞 𝟎𝟔 | 𝐈𝐬𝐬𝐮𝐞 𝟎𝟐 | 𝐀𝐩𝐫𝐢𝐥 𝟐𝟎𝟐𝟑