Enter Your Details to Register

Please enter your official e-mail ID. Kindly do not use a personal ID like GMail, Yahoo etc.,
Please do not enter +91 or 0.
Image CAPTCHA
Enter the characters (without spaces) shown in the image.

Enter Your Log-in Details

Close

The Path to a Secure Application: A Source Code Security Review Checklist

Published 13th Apr 2009 | Source - OUNCE LABS | Pages - 16

The path to creating a secure application begins by rigorously testing source code for any and all vulnerabilities, to ensure the application will not compromise, or allow others to compromise, data privacy and integrity.

For companies using custom-built, outsourced, or open source applications in-house, ensuring all current and legacy code is secure, however, will be no small challenge. Detecting and eradicating security vulnerabilities has historically been extremely difficult. Many organizations relied on manual code review, which is costly and labor-intensive, as well as penetration testing, which examines only a subset of potential application vulnerabilities in an application.

While both of these approaches have their uses, automatic software vulnerability scanning tools now allow companies to approach secure code development in a more systematic, automated, and successful manner. These automatic vulnerability scanning tools greatly improve the speed and accuracy of code review, and may be integrated seamlessly into the development lifecycle. In fact, the best tools can pinpoint each vulnerability at the precise line of code and provide detailed information about the type of flaw, the risk it poses, and how to fix it.

 

Sponsored Content

Sign In

Please sign in and you will have access to all the content available on CIO.in

Username


Password




Forgotten password?

One Time Registration Only !

Register now For your free CIO.in account and avail the following key benefits:
  • Never fill up any form to download whitepapers and case studies
  • Special invitations to CIO events
  • Be the first to get CIO reports & analysis
  • CIO special offers... and much more!

latest whitepapers

  • Dell PowerEdge VRTX Helps You Simplify Systems Management without Compromise

    In this whitepaper we explain how PowerEdge VRTX redefines flexibility with a stable platform, revolutionizes infrastructure design with the concept of integrated shared storage and resolves the problems of systems management tool proliferation and complexity in a unified, all-in-one console.

    Source Dell
  • Delivering Biggest Performance Boost to Your Business with Dell’s Flash Storage

    This whitepaper explains how Dell Compellent flash-optimized solutions have changed the economics of flash storage – with solutions which combine enhancements in Data Progression with new flash and dense enclosures, broken the current pricing boundaries - with solutions that can provide performance at the capacity and price of a rotating disk and leveraged flash to improve workload performance - bringing in new economics of storage with advances in intelligent tiering and a unique use of multiple types of SSD drives.

    Sponsored by Dell
  • Delivering Biggest Performance Boost to Your Business with Dell’s Flash Storage

    This whitepaper explains how Dell Compellent flash-optimized solutions have changed the economics of flash storage – with solutions which combine enhancements in Data Progression with new flash and dense enclosures, broken the current pricing boundaries - with solutions that can provide performance at the capacity and price of a rotating disk and leveraged flash to improve workload performance - bringing in new economics of storage with advances in intelligent tiering and a unique use of multiple types of SSD drives.

    Source Dell

close