

So, security best practices such as the OWASP Application Security Verification Standard (ASVS) or Mozilla’s Secure Coding Guidelines exist in order to help developers produce secure software.

There are some nasty consequences if a vulnerability gets exploited: a loss of trust, a bad reputation, or even financial loss. Moreover, because of its nature, a security bug is not just a regular item in your backlog. It’s a lot: The number of security bugs published over the years by Just look at the CVE numbers over the years. More complexity means more potential weaknesses for a hacker to abuse while you're designing, implementing, deploying, or maintaining the code. So, why should I care about malicious attempts?”Ī somewhat complex piece of software is difficult to keep secure all the time. Isn’t preventing security bugs enough? I can hear you saying, “As long as I write secure code, I don’t care whether hackers play with my rock-solid software or not. How about we catch and act upon the hackers who are trying to break into our software? In this post, I’ll try to give you practical and simple examples of catching typical hacker behaviors in your code early. If so, that’s great – even if there are always things that get overlooked, you should always be thinking about the security of your system.īut there’s a huge difference between preventing security bugs and forgiving malicious attempts.

You might be thinking about all the secure design choices you have made, or preventative techniques you applied, so there’s nothing to worry about. What would you do if hackers were abusing your software in production?
