Avoiding Vulnerable Code
Now that you have discovered how frameworks and models can be used to avoid vulnerable code, this section will reinforce some practical steps that can be undertaken to accomplish the same. The practical steps are as follows:
- Integrate security concerns into each phase of the SDLC: Starting with the requirements collecting phase, security issues should be included in every phase of the SDLC. This guarantees that security threats are discovered and handled throughout the development process.
- Use threat modeling with the STRIDE technique to detect potential security threats: Using the STRIDE methodology, the development team may determine the potential security dangers that the software could face such as spoofing, tampering, repudiation, information leakage, DoS, and elevation of privilege.
- Apply mitigation techniques: Once the possible security threats have been identified, the development team can develop and apply mitigation techniques to mitigate...