LinkORB Engineering
As an organization that offers software solutions in healthcare and other sectors, security and privacy are some of our highest priorities at LinkORB. The Engineering team, especially developers and database administrators, are responsible for the security and privacy of the information and applications we offer our users and customers.
Using industry best practices, our developers significantly reduce the attack surface of our applications and APIs that are accessible over the Internet without degrading user experience. Bearing in mind that threat actors only need to find one exploitable vulnerability to gain unauthorized access, LinkORB developers are expected to patch identified vulnerabilities immediately as well as proactively employ best practices to reduce a threat actor’s ability to identify and exploit unidentified vulnerabilities.
This guide introduces developers to common web application vulnerabilities and recommends secure application development practices to prevent or fix such vulnerabilities. Specifically, it discusses the following:
Secure application development encompasses all security operations performed throughout the development lifecycle with the following objectives:
A vulnerability is a design or implementation loophole (weakness) that gives threat actors unauthorized access to an application. Threat actors scanning for and looking to exploit vulnerabilities in a web application can include:
Threat actors usually exploit one of the following vulnerabilities to gain unauthorized access to a web application:
Please see OWASP Top Ten for a comprehensive list of common web application vulnerabilities.
Threat modeling is the process of identifying and quantifying potential vulnerabilities from a threat actor’s perspective, and then prioritizing safeguards and countermeasures for a given application. Among other things, threat modeling allows developers to create profiles of potential threat actors and identify what attack vectors they may try to exploit. This helps detect and fix security problems in an application before it is deployed to production.
You may adopt one or more threat modeling methods throughout the application development lifecycle. STRIDE and P.A.S.T.A. are some of the most popular ones. Please see Threat model for more information.
STRIDE is our preferred threat model for vulnerabilities in our internal and external applications, APIs, and processes. It identifies vulnerabilities and provides countermeasures by first classifying each threat actor’s goal(s). Please see threat modeling process for a structured guide on using the STRIDE model.
Please see OWASP top ten for comprehensive descriptions and fixes of the 10 most critical and most common web application vulnerabilities.
Injection is one of the most common and most critical vulnerabilities in the wild. The following are some of its most common variants:
To safeguard a web application against injection attacks:
Please see Injection Flaws for a comprehensive guide on identifying and preventing injection vulnerabilities.
Vulnerability Remediation provides a high-level step-by-step guide for addressing security weaknesses in a system.
OWASP’s Web Security Testing Guide provides comprehensive guides for testing, identifying, preventing, and fixing vulnerabilities throughout an application’s lifecycle.
See Secure development and deployment guidance for an in-depth guide on secure application development, deployment, and maintenance best practices.
Developers performing Docker-related operations will benefit from reviewing the following security-focused resources:
Please see the information security guide for more information.
#security
)