5. Securing the Web#
Apply security features incorporated into software including data protection, security, privacy and regulatory compliance
encryption
input validation
secure defaults
Design, develop and implement code using defensive data input handling practices, including input validation, sanitisation and error handling
Design, develop and implement a safe application programming interface (API) to minimise software vulnerabilities
safe endpoints
request validation
authentication and authorisation
least privilege
rate limiting
data exposure
safe error responses
HTTPS for APIs
Design, develop and implement code considering efficient execution for the user
memory management
exception management
Design, develop and implement secure code to minimise vulnerabilities in user action controls
broken authentication and session management
cross-site scripting (XSS) and cross-site request forgery (CSRF)
invalid forwarding and redirecting
race conditions
Design, develop and implement secure code to protect user file and hardware vulnerabilities from file attacks and side channel attacks
file attacks
side channel attacks
Investigate and describe the function of web protocols and their ports
HTTPS
Chapter Contents