Secure development

REVIEW

NCSC guidance

We follow NCSC’s 8 principles of secure development and deployment.

OWASP

Top ten web application risks

Production code must be written with an understanding of common security risks as defined in the latest OWASP Top 10 web application security risks

Top ten proactive controls

Production code must be written in accordance with good security practices as defined in the OWASP top 10 proactive controls

References

Related articles

  • Security is everyone’s responsibility

  • Keeping our software up to date with the latest versions of dependant libraries and runtimes

  • Avoid committing ‘secrets’ such as API keys into source control

  • Removing sensitive data such as non-revokable secrets or contributor identities from Git

  • Use HTTP headers to protect our users

  • Use CSP as the modern approach to securing our web applications


Improve the playbook

If you spot anything factually incorrect with this page or have ideas for improvement, please share your suggestions.

Before you start, you will need a GitHub account. Github is an open forum where we collect feedback.