Mitigation and Verification

Improve Security Posture Software Development Life Cycle (SDLC) The requirement phase is used to capture all requirements from the customer and create the proper documentation.


Vulnerability Response

Vulnerability Reports This document usually contains the following information: Vulnerability Type Severity System Explanation Walkthrough Recommendation Using a Standard template Vulnerability Severity common Vulnerability Scoring System Verison 3.


Discovery Methodlogies

Static Application Security Testing (SAST) Static Application Security Testing (SAST) is a tool used to analyze application source code or compiled code to help identify possible security vulnerabilities.


Common Web Application Vulnerabilities

Injection Best Practice Use Parameterized Queries - This is the best method in preventing SQL Injection because all variables are limited to the data type.


1 of 1