You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: practices/security.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ The remainder of this page gives more detailed and specific recommendations to b
83
83
- Be wary of any 3rd party JavaScript included on the page, e.g. for A/B testing, analytics
84
84
- Pin dependencies at known versions to avoid unexpected updates
85
85
- Scan dependencies for vulnerabilities, e.g. using [OWASP Dependency Check](https://owasp.org/www-project-dependency-check/) or [Snyk](https://snyk.io/)
86
-
- Scan running software, e.g. using [OWASP ZAP](https://owasp.org/www-project-zap/)
86
+
- Scan running software, e.g. using [OWASP ZAP](https://www.zaproxy.org/)
87
87
-**Automate** security testing — on every build if practical
88
88
- Generate test data in a way that avoids including personally identifiable information
89
89
- When granting roles to CI/CD tools, use different roles for the different stages in the deployment pipeline — for example so that a deployment meant for a development account cannot be performed against a production account
@@ -142,17 +142,17 @@ The remainder of this page gives more detailed and specific recommendations to b
142
142
<details><summary>Example IAM policy fragment to prevent unencrypted RDS databases (click to expand)</summary>
0 commit comments