Abuse Case
Modeling abuse cases to proactively identify how attackers might misuse application features.
Access Control
Auth & IdentityDesigning access control systems: role-based access, object-level authorization, and deny-by-default.
Access Control
AI Agent Security
Security guidelines and best practices covering a i agent security.
AJAX Security
Security guidelines and best practices covering a j a x security.
Attack Surface Analysis
Identifying and reducing your attack surface through component inventory and exposure analysis.
Authentication
Auth & IdentityBest practices for secure authentication: password policies, MFA, account lockout, and credential storage.
Authentication
Authorization
Auth & IdentityImplementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.
Authorization
Authorization Testing Automation
Auth & IdentityImplementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.
Authorization
Automotive Security
Security guidelines and best practices covering automotive security.
Bean Validation
Security guidelines and best practices covering bean validation.
Bot Management and Anti-Automation
Security guidelines and best practices covering bot management and anti- automation.
Browser Extension Vulnerabilities
Security guidelines and best practices covering browser extension vulnerabilities.
Business Logic Security
Security guidelines and best practices covering business logic security.
C-Based Toolchain Hardening
Security guidelines and best practices covering c- based toolchain hardening.
Choosing and Using Security Questions
Security guidelines and best practices covering choosing and using security questions.
CI CD Security
Security guidelines and best practices covering c i c d security.
Clickjacking Defense
Injection & InputProtecting against clickjacking using X-Frame-Options, CSP frame-ancestors, and framebusting.
Clickjacking
Content Security Policy
API & WebBuilding a robust CSP to prevent XSS and data injection by controlling resource loading.
Content Security
Cookie Theft Mitigation
Auth & IdentitySecurity guidelines and best practices covering cookie theft mitigation.
Cookie
Credential Stuffing Prevention
Security guidelines and best practices covering credential stuffing prevention.
Cross Site Scripting Prevention
Security guidelines and best practices covering cross site scripting prevention.
Cross-Site Request Forgery Prevention
Security guidelines and best practices covering cross- site request forgery prevention.
Cryptographic Storage
Encrypting sensitive data at rest: algorithm selection, key management, and common pitfalls.
Database Security
CryptographyDatabase hardening: least-privilege accounts, encrypted connections, and query parameterization.
Database
Denial of Service
Security guidelines and best practices covering denial of service.
Dependency Graph SBOM
Security guidelines and best practices covering dependency graph s b o m.
Deserialization
CryptographyMitigating insecure deserialization: integrity checks, type whitelisting, and safe library usage.
Deserialization
Django REST Framework
API & WebDjango security checklist: DEBUG mode, CSRF middleware, secure cookies, and allowed hosts.
REST
Django Security
Django security checklist: DEBUG mode, CSRF middleware, secure cookies, and allowed hosts.
Docker Security
InfrastructureHardening Docker containers: least-privilege users, read-only filesystems, network isolation, and image scanning.
Docker
DOM based XSS Prevention
Injection & InputDefending against Cross-Site Scripting with output encoding, Content Security Policy, and input sanitization.
XSS
DOM Clobbering Prevention
Security guidelines and best practices covering d o m clobbering prevention.
DotNet Security
Languages.NET and ASP.NET security: ViewState protection, request validation, and identity management.
DotNet
Drone Security
Security guidelines and best practices covering drone security.
Email Validation and Verification
Security guidelines and best practices covering email validation and verification.
Error Handling
Logging & ErrorsSecure error handling to prevent stack trace exposure and information leakage to attackers.
Error Handling
File Upload
Logging & ErrorsSecuring file uploads: type and size validation, storage isolation, and preventing malware execution.
File Upload
Forgot Password
Auth & IdentitySecure password reset flows: token expiry, single-use links, and account enumeration prevention.
Password
GitHub Actions Security
Security guidelines and best practices covering git hub actions security.
GraphQL
API & WebGraphQL security: depth and complexity limits, introspection controls, auth enforcement, and injection prevention.
GraphQL
gRPC Security
Security guidelines and best practices covering g r p c security.
HTML5 Security
Security guidelines and best practices covering h t m l5 security.
HTTP Headers
API & WebSecurity guidelines and best practices covering h t t p headers.
HTTP
HTTP Strict Transport Security
API & WebEnforcing HTTPS-only communication with HSTS preloading and max-age configuration.
HTTP
Infrastructure as Code Security
InfrastructureSecurity for IaC: secrets scanning, policy-as-code, and drift detection in Terraform and Ansible.
Infrastructure
Injection Prevention
Injection & InputPreventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.
Injection
Injection Prevention in Java
Injection & InputPreventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.
InjectionJava
Input Validation
Injection & InputValidating and sanitizing all user input to prevent injection attacks and maintain data integrity.
Input Validation
Insecure Direct Object Reference Prevention
Preventing IDOR vulnerabilities with proper authorization checks on every object access.
JAAS
Security guidelines and best practices covering j a a s.
Java Security
LanguagesJava security fundamentals: serialization risks, secure random, and cryptographic API usage.
Java
JSON Web Token for Java
LanguagesJava security fundamentals: serialization risks, secure random, and cryptographic API usage.
Java
Key Management
Cryptographic key lifecycle management: generation, rotation, storage, and revocation.
Kubernetes Security
InfrastructureSecuring Kubernetes clusters: RBAC, network policies, pod security standards, and secrets management.
Kubernetes
Laravel
Security guidelines and best practices covering laravel.
LDAP Injection Prevention
Injection & InputPreventing LDAP injection through input encoding and parameterized LDAP queries.
InjectionLDAP
Legacy Application Management
Security guidelines and best practices covering legacy application management.
LLM Prompt Injection Prevention
Injection & InputPreventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.
Injection
Logging
Logging & ErrorsWhat to log, how to protect log integrity, centralized logging patterns, and avoiding sensitive data leakage.
Logging
Logging Vocabulary
Logging & ErrorsWhat to log, how to protect log integrity, centralized logging patterns, and avoiding sensitive data leakage.
Logging
Mass Assignment
Protecting against mass assignment by explicitly allowing only expected fields in model binding.
MCP Security
Security guidelines and best practices covering m c p security.
Microservices based Security Arch Doc
Security guidelines and best practices covering microservices based security arch doc.
Microservices Security
Securing microservice architectures: service-to-service auth, API gateways, and zero-trust networking.
Mobile Application Security
MobileCross-platform mobile security covering data storage, authentication, and network communication.
Mobile
Multi Tenant Security
Security guidelines and best practices covering multi tenant security.
Multifactor Authentication
Auth & IdentityImplementing MFA: TOTP, hardware keys, push notifications, and recovery code strategies.
Authentication
Network Segmentation
Security guidelines and best practices covering network segmentation.
NodeJS Docker
InfrastructureSecurity guidelines and best practices covering node j s docker.
DockerNode
Nodejs Security
LanguagesSecurity guidelines and best practices covering nodejs security.
Node
NoSQL Security
Security guidelines and best practices covering no s q l security.
NPM Security
Security guidelines and best practices covering n p m security.
OAuth2
Auth & IdentityImplementing OAuth 2.0 safely: grant types, PKCE, token storage, and preventing common attack vectors.
OAuth
OS Command Injection Defense
Injection & InputSecurity guidelines and best practices covering o s command injection defense.
Injection
Password Storage
Auth & IdentitySecure password hashing with bcrypt, Argon2, and scrypt including salting and migration strategies.
Password
PHP Configuration
LanguagesHardening PHP applications through secure php.ini settings and safe coding patterns.
PHP
Pinning
Certificate and public key pinning to prevent man-in-the-middle attacks in mobile and thick clients.
Prototype Pollution Prevention
Preventing prototype pollution in JavaScript by avoiding recursive merge on untrusted input.
Query Parameterization
Security guidelines and best practices covering query parameterization.
RAG Security
Security guidelines and best practices covering r a g security.
REST Assessment
API & WebSecurity guidelines and best practices covering r e s t assessment.
REST
REST Security
API & WebSecurity for RESTful APIs: authentication, input validation, rate limiting, and error handling.
REST
Ruby on Rails
LanguagesSecuring Rails apps: mass-assignment protection, SQL injection prevention, and XSS mitigations.
Ruby
SAML Security
Security guidelines and best practices covering s a m l security.
Secrets Management
InfrastructureStoring, rotating, and auditing secrets: vault solutions, environment variables, and avoiding hard-coding.
Secrets
Secure AI Model Ops
Security guidelines and best practices covering secure a i model ops.
Secure Cloud Architecture
InfrastructureSecuring cloud workloads: IAM least-privilege, encryption at rest and in transit, and audit logging.
Cloud
Secure Code Review
Security guidelines and best practices covering secure code review.
Secure Coding with AI
Security guidelines and best practices covering secure coding with a i.
Secure Product Design
Security guidelines and best practices covering secure product design.
Securing Cascading Style Sheets
Security guidelines and best practices covering securing cascading style sheets.
Security Terminology
Security guidelines and best practices covering security terminology.
Server Side Request Forgery Prevention
Security guidelines and best practices covering server side request forgery prevention.
Serverless FaaS Security
Security guidelines and best practices covering serverless faa s security.
Session Management
Auth & IdentitySecure session lifecycle: token generation, expiry, invalidation, and safe cookie attributes.
Session
Software Supply Chain Security
Security guidelines and best practices covering software supply chain security.
SQL Injection Prevention
Injection & InputPreventing SQL injection using parameterized queries, stored procedures, and allow-list input validation.
SQL InjectionInjection
Subdomain Takeover Prevention
Security guidelines and best practices covering subdomain takeover prevention.
Symfony
Security guidelines and best practices covering symfony.
Third Party Javascript Management
LanguagesManaging third-party scripts securely: SRI, CSP restrictions, and vendor risk evaluation.
Java
Third Party Payment Gateway Integration
Security guidelines and best practices covering third party payment gateway integration.
Threat Modeling
Structured threat analysis using STRIDE, attack trees, and data flow diagrams before writing code.
TLS Cipher String
InfrastructureSelecting secure TLS cipher suites to balance compatibility and cryptographic strength.
TLS
Transaction Authorization
Auth & IdentityImplementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.
Authorization
Transport Layer Protection
Security guidelines and best practices covering transport layer protection.
Transport Layer Security
Configuring TLS: cipher suites, certificate validation, HSTS, and avoiding common misconfigurations.
Unvalidated Redirects and Forwards
Preventing open redirect attacks by validating and whitelisting redirect targets.
User Privacy Protection
Implementing privacy by design: data minimization, consent, and user data deletion rights.
Virtual Patching
Using WAF rules and middleware to temporarily mitigate vulnerabilities before a code fix ships.
Vulnerability Disclosure
Establishing a responsible vulnerability disclosure policy and coordinated response process.
Vulnerable Dependency Management
Security guidelines and best practices covering vulnerable dependency management.
Web Service Security
Securing web services: SOAP/REST authentication, message integrity, and service hardening.
WebSocket Security
Security guidelines and best practices covering web socket security.
XML External Entity Prevention
Injection & InputDefending against XXE attacks by disabling external entity processing in XML parsers.
XML
XML Security
Injection & InputSecurity guidelines and best practices covering x m l security.
XML
XS Leaks
Security guidelines and best practices covering x s leaks.
XSS Filter Evasion
Injection & InputSecurity guidelines and best practices covering x s s filter evasion.
XSS
Zero Trust Architecture
Security guidelines and best practices covering zero trust architecture.