Home >Common Problem >Application system code security review content includes

Application system code security review content includes

(*-*)浩
(*-*)浩Original
2019-10-25 10:45:305313browse

Information system source code security review is the process of static security scanning and review of custom-developed application source code to identify coding flaws and vulnerabilities that may lead to security issues.

Application system code security review content includes

# Information system source code security review is carried out by deploying the application system development environment on the test machine and importing the software source code. The project team uses tools to statically scan the source code in the early stage of the security review. Later, it manually reviews and analyzes the scan results to confirm the security risks in the source code and form a final source code security review report.

Information system source code security review content (Recommended learning: web front-end video tutorial)

Input validation and presentation classes: cross-site scripting, SQL injection, denial of service, etc.

Code quality: null pointer calls, resources not released, etc.

API call classes: null values ​​not checked, return values ​​not detected, etc.

Security Features: Password management, unsafe random numbers, etc.

Time and status: code errors, fixed sessions, etc.

Error handling: too many exception captures, too many thrown exceptions, etc.

Encapsulation class: system information leakage, etc.

Environment class: password management, etc.

Information system source code security review process

Total It is divided into five stages: commission acceptance, preparation, implementation, evaluation and conclusion.

Entrustment acceptance stage: Pre-sale communication with the entrusting unit on the source code review project, signing the "Confidentiality Agreement", receiving information submitted by the unit being tested, and assisting the unit being tested in filling out the "Information System Source Code Security Review" Basic Situation Questionnaire", and when necessary, the central technical department will provide technical consultation to the entrusting unit. After the preliminary communication, the two parties signed the "Information System Source Code Security Review Contract".

Preparation stage: The project manager organizes the preparation of the "Information System Source Code Security Review Plan", communicates with the entrusting unit on the content of the test plan, and determines the specific date of the information system source code security review and the personnel to cooperate with the client. Inform customers to make preparations before testing.

The specific date of the review and the customer’s cooperating personnel will be notified to the customer to prepare for the test.

Implementation stage: The project manager clarifies the test items undertaken by the project team's testing personnel, deploys the testing environment according to the "Information System Source Code Security Review Basic Situation Questionnaire" submitted by the unit being tested, and prepares for the source code security review Preparation. After the inspection personnel complete the source code security scan, they will analyze and review the source code scan results based on the scan results. After the analysis and review work is completed, project team members should completely clear the customer code information loaded in the testing equipment under the supervision of the supervisor and the customer.

Comprehensive assessment stage: The project team organizes the source code security review data, prepares the "Information System Source Code Security Review Report" and communicates the review results with the customer.

Finding stage: The project team will organize various documents and process records generated during the evaluation process, and automatically archive and save them. Customer service staff will invite customers to fill in the "Customer Satisfaction Survey Form" to collect customer feedback.

The above is the detailed content of Application system code security review content includes. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn