Skip to content

Secure Code Review Part 2

Catalog Module

Published on

The process and checklists for performing security code review. Examine how to do code review for parameterized SQL queries, user management/authentication, session management, authorization, cryptography, logging/error handling, and security configuration. Secure code review discovers potential vulnerabilities that manifest in code and design and mitigates those issues by modifying the code.