Security Best Practices
Atomic decision guides for building secure web applications across all languages and frameworks.
I need to...
| I need to... | Guide |
|---|---|
| Understand the security mindset and defense principles | Security Mindset Overview |
| Know the most critical web vulnerabilities | OWASP Top 10 |
| Validate user input safely | Input Validation |
| Escape output correctly for different contexts | Output Encoding and Escaping |
| Prevent cross-site scripting attacks | Cross-Site Scripting (XSS) |
| Implement XSS prevention patterns | XSS Prevention Patterns |
| Prevent SQL injection | SQL Injection Prevention |
| Protect against CSRF attacks | CSRF Prevention |
| Implement secure authentication | Authentication Best Practices |
| Design proper authorization systems | Authorization and Access Control |
| Protect sensitive data | Sensitive Data Protection |
| Configure security headers | Security Headers |
| Secure my APIs | API Security |
| Handle file uploads safely | File Upload Security |
| Manage dependencies securely | Dependency Security |
| Implement secure logging | Logging and Monitoring |
| Understand cryptography basics | Cryptography Basics |
| Integrate security into development | Secure Development Lifecycle |
| Avoid common security mistakes | Common Security Anti-Patterns |
| Quick security checklist | Security Checklist |
| Find security resources and tools | Code Reference Map |
| Find sources and maintenance info | Sources and Maintenance Manifest |