Skip to content

0xn3va/application-security-handbook

Repository files navigation

Application Security Handbook

A knowledge base of best practices for application security. You can find the Gitbook version here.

Feel free to point out mistakes and write your ideas here.

Overview

This project contains a knowledge base of best practices for application security for software developers and application security engineers.

Best practices are divided into sections, each of which contains requirements for the implementation of certain functionality. Requirements can be required or advanced, the following labels are used to separate them:

  • base Required requirements.
  • advanced Advanced requirements.

Required requirements represent a necessary minimum that must be taken into account during implementation. Advanced requirements include best practices, the implementation of which is desirable when possible.

Please note that some requirements may have a negative impact on business processes or may not be applicable to an application. In this case, adapt them taking into account local conditions.

Why does it exist?

There are many resources where you can find the best practices for secure development like OWASP Cheat Sheet Series or OWASP Application Security Verification Standard. However, all of these resources are more focused on the infosec guys. From the developer's point of view, these resources are too cumbersome and require their processing into understandable development requirements. This project exists precisely to facilitate this work and to provide best practices in the form of requirements that can be directly used in development tasks.

Credits