![](https://static.isu.pub/fe/default-story-images/news.jpg?width=720&quality=85%2C50)
1 minute read
Request forgeries
Topic Details
deployment, and automation concepts. Development Test Staging Production Quality assurance (QA) 2. Provisioning and deprovisioning 3. Integrity measurement 4. Secure coding techniques
Advertisement
Normalization Stored procedures Obfuscation/camouflage Code reuse/dead code Server-side vs. client-side execution and validation Memory management Use of third-party libraries and software development kits (SDKs) Data exposure 5. Open Web Application Security Project (OWASP) 6. Software diversity
Compiler Binary 7. Automation/scripting
Automated courses of action Continuous monitoring Continuous validation Continuous integration Continuous delivery Continuous deployment 8. Elasticity 9. Scalability 10. Version control