From the course: Static Application Security Testing
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
A4: Insecure design - SonarQube Tutorial
From the course: Static Application Security Testing
A4: Insecure design
- [Instructor] The fourth set of risks in the OWASP top 10 list are insecure design flaws. Some years back, the US Cybersecurity and Infrastructure Security Agency, better known as CISA, provided resources to help software developers, architects, and security professionals build security into software from day one. While that part of their website has been archived, those principles are still critical. While all the top 10 risks are intended to drive security conversations early on in the development lifecycle, this particular risk is intended to pull those conversations even earlier before the developers write a single line of code. For many organizations, conversations around insecure design risks may require a culture shift. It's one thing to scan for and fix vulnerabilities related to the other top 10 risks, but asking the devs to design apps with security at the forefront is a heavier lift. These risks can creep…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
The OWASP Top 103m 26s
-
(Locked)
A1: Broken access controls6m 17s
-
(Locked)
A2: Cryptographic failures7m 29s
-
(Locked)
A3: Injection8m
-
(Locked)
A4: Insecure design5m 21s
-
(Locked)
A5: Security misconfiguration7m 58s
-
(Locked)
A6: Vulnerable and outdated components7m 8s
-
(Locked)
A7: Identification and authentication failures7m 39s
-
(Locked)
A8: Software and data integrity failures5m 49s
-
(Locked)
A9: Security logging and monitoring failures6m 55s
-
(Locked)
A10: Server-Side Request Forgery4m 58s
-
(Locked)
-