Summary
In this chapter, we covered important actions that should be taken toward avoiding major incidents in different aspects that were covered throughout previous chapters. We learned tips on how to better code APIs for the sake of reducing risks in authentication mechanisms, user input, error handling and exception management, and data protection.
In general, we learned that it’s about leveraging widely used open source libraries that implement secure mechanisms or open algorithms, combined with some practices such as avoiding hardcoding important things in the logic and continuously monitoring the activities. Never reinvent the wheel. Avoid obscure solutions as much as possible. In the end, if neither you nor the community nor a compliance authority can audit such a product or service, it’s nearly impossible to truly know what’s going on behind the scenes, as we learned in this chapter.
Furthermore, we learned that it’s important for developers...