Secure coding guidelines

Secure coding prevents vulnerabilities by enforcing strict controls on data handling, authentication, and system interactions. Follow these principles:

  • defence in Depth – Multiple layers of security (input validation, output encoding, least privilege).

  • Zero Trust – Treat all inputs as malicious, even from “trusted” sources.

  • Automate Security – Use linters, SAST tools, and dependency scanners.


Last update: 2025-05-12 14:39