Summary
This chapter covered secure coding guidelines around working with suppliers and other third-party vendors. Whether you are developing applications on your own or have outsourced the work, it is important to design applications with security built in from the requirements stage of the SDLC. There are some risks of having third parties develop applications for you. One important risk is the possibility of the firm going out of business. Processes such as third-party trust and code escrow can mitigate the risks of you losing your entire project should the worst happen to your supplier. Most applications work with some type of database, so securing these database systems is important. You learned how ACID secures database transactions and data. Finally, you learned about the differences between expert systems, machine learning, and neural networks, and how these can secure applications.
Security is an ongoing process. It is the recommended best practice to integrate security...