Custom Development

3 Simple but Powerful Rules for Identifying Your Applications' Untrusted Data

Max McCarty

You don’t need to be a technical resource on a project to realize the significance between an application’s success and its security. You also don’t need to be a technical contributor to understand how much untrusted data plays a role in a large swath of the most serious web security risks, from cross-site scripting to SQL injection and beyond.

However, like a needle in a haystack, it’s one thing to know it's there and another to know how to find it. Here are 3 rules to help programmers, quality control engineers, project leads, managers and their teams identify their applications' untrusted data.

Identifying Untrusted Data

It’s very easy to assume you know how to identify untrusted data. For the most part, it’s definitely any information that someone submits to your application... right? Or is it? I’m going to ask you a few questions and see how you fare when it comes to determining if certain information should be trusted or not. I’ll throw up a softball to start...

Continue Reading on Lock Me Down

Max McCarty
ABOUT THE AUTHOR

Max McCarty is a Senior Technical Consultant at Summa with a passion for breathing life into big ideas. He is the founder and owner of LockMeDown.com and host of the popular Lock Me Down podcast. As a software engineer, Max’s focus is on software security, and strongly believes in empowering the everyday developer with the information to write more secure software. When he’s not building new applications or writing about web security, you’ll find Max burning calories with his kids and spending time with his wonderful family. He’s also a serious history buff.