SlideShare a Scribd company logo
1 of 73
Building a Security Program
at Grammarly
Dima Tiagulskyi - Software Engineer, Security Team
Thank you!
dima.tiagulskyi@grammarly.com
● Early Life
○ https://twitter.com/badthingsdaily
○ https://enterprise.verizon.com/resources/reports/dbir/
○ https://krebsonsecurity.com/
○ https://www.loopio.com/blog/respond-security-questionnaires-3
● Bug Bounty
○ https://danielmiessler.com/study/security-assessment-types/
○ https://hackerone.com/grammarly
○ https://www.bugcrowd.com/
○ https://hackerone.com/dropbox
○ https://securitytxt.org/
References
References
● Jurassic CorpSec
○ Building Identity for an Open Perimeter
○ https://www.gartner.com/reviews/market/access-management
○ https://support.1password.com/create-share-vaults/
○ https://aws.amazon.com/blogs/aws/built-in-authentication-in-alb/
● Protecting Endpoints
○ https://www.jamf.com/
○ https://en.wikipedia.org/wiki/Endpoint_Detection_and_Response
○ Configure an external recipient warning
● Security Team
○ https://about.gitlab.com/handbook/engineering/security/#security-department
○ https://www.owasp.org/index.php/OWASP_SAMM_Project
○ https://www.cisecurity.org/controls/cis-controls-list/
● Incident Detection and Response
○ https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Auditing.html
○ https://www.dmtf.org/standards/cadf
○ https://aws.amazon.com/products/security/
○ https://www.sumologic.com/security/
○ https://www.cisecurity.org/cis-benchmarks/
● Infrastructure
○ https://aws.amazon.com/organizations/
○ https://aws.amazon.com/controltower/
○ https://aws.amazon.com/blogs/compute/refreshing-an-amazon-ecs-container-instance-cluster-with-a-new-ami/
● Abuse Research and Infrastructure
○ https://www.troyhunt.com/
○ https://elie.net/
References
● Security Culture
○ https://www.owasp.org/index.php/Security_Champions_Playbook
○ https://www.amazon.com/Securing-DevOps-Security-Julien-Vehent/dp/1617294136
○ https://www.amazon.com/Agile-Application-Security-Enabling-Continuous/dp/1491938846
● OWASP
○ https://www.owasp.org/index.php/OWASP_SAMM_Project
○ https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
○ https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
○ https://cheatsheetseries.owasp.org/
● Integrating Security in Development
○ https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
○ https://report-uri.com/
○ https://web.dev/samesite-cookies-explained/
○ https://www.chromium.org/updates/same-site
○ https://www.synopsys.com/software-integrity/security-testing/software-composition-analysis.html
References

More Related Content

Similar to Building a Security Program at Grammarly - XP Days 2019

The Red Button: Adventures in Security Leadership
The Red Button: Adventures in Security LeadershipThe Red Button: Adventures in Security Leadership
The Red Button: Adventures in Security LeadershipVMware Tanzu
 
Teaching TDD to Different Learning Styles
Teaching TDD to Different Learning StylesTeaching TDD to Different Learning Styles
Teaching TDD to Different Learning StylesVMware Tanzu
 
Basic WordPress Security 2018 - WordCamp ABQ
Basic WordPress Security 2018 - WordCamp ABQBasic WordPress Security 2018 - WordCamp ABQ
Basic WordPress Security 2018 - WordCamp ABQDr. Kim Kuhlman
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defenseJose Mato
 
Staying safe in the cloud
Staying safe in the cloudStaying safe in the cloud
Staying safe in the cloudOleg Podsechin
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdfAbhi Jain
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationIves Laaf
 
Human Factors in Security: Toward Security-Conscious Development
Human Factors in Security: Toward Security-Conscious DevelopmentHuman Factors in Security: Toward Security-Conscious Development
Human Factors in Security: Toward Security-Conscious DevelopmentVMware Tanzu
 
DSC GCOE, Nagpur intro session
DSC GCOE, Nagpur intro sessionDSC GCOE, Nagpur intro session
DSC GCOE, Nagpur intro sessionDSCGCOEN
 
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...TigerGraph
 
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress CodingWordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress CodingAaron Saray
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
SECIAMPA, CompTIA Security+ Guide to Network Security FundamMoseStaton39
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
SECIAMPA, CompTIA Security+ Guide to Network Security FundamMikeEly930
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docxgertrudebellgrove
 
Privacy as a ranking factor
Privacy as a ranking factorPrivacy as a ranking factor
Privacy as a ranking factorPhil Pearce
 
The Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdfThe Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdfHacken
 
Презентация хакатона.pptx
Презентация хакатона.pptxПрезентация хакатона.pptx
Презентация хакатона.pptxNurbek8
 

Similar to Building a Security Program at Grammarly - XP Days 2019 (20)

The Red Button: Adventures in Security Leadership
The Red Button: Adventures in Security LeadershipThe Red Button: Adventures in Security Leadership
The Red Button: Adventures in Security Leadership
 
Introduction to Lean UX
Introduction to Lean UXIntroduction to Lean UX
Introduction to Lean UX
 
Teaching TDD to Different Learning Styles
Teaching TDD to Different Learning StylesTeaching TDD to Different Learning Styles
Teaching TDD to Different Learning Styles
 
Basic WordPress Security 2018 - WordCamp ABQ
Basic WordPress Security 2018 - WordCamp ABQBasic WordPress Security 2018 - WordCamp ABQ
Basic WordPress Security 2018 - WordCamp ABQ
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defense
 
Staying safe in the cloud
Staying safe in the cloudStaying safe in the cloud
Staying safe in the cloud
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
Human Factors in Security: Toward Security-Conscious Development
Human Factors in Security: Toward Security-Conscious DevelopmentHuman Factors in Security: Toward Security-Conscious Development
Human Factors in Security: Toward Security-Conscious Development
 
DSC GCOE, Nagpur intro session
DSC GCOE, Nagpur intro sessionDSC GCOE, Nagpur intro session
DSC GCOE, Nagpur intro session
 
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...
Graph Gurus Episode 10: Analyzing Temporal Data with Native Parallel Graph Da...
 
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress CodingWordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam
 
Web 2
Web 2Web 2
Web 2
 
Web 2
Web 2Web 2
Web 2
 
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx
 SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx
SECIAMPA, CompTIA Security+ Guide to Network Security Fundam.docx
 
Privacy as a ranking factor
Privacy as a ranking factorPrivacy as a ranking factor
Privacy as a ranking factor
 
The Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdfThe Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdf
 
Презентация хакатона.pptx
Презентация хакатона.pptxПрезентация хакатона.pptx
Презентация хакатона.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Building a Security Program at Grammarly - XP Days 2019

  • 1. Building a Security Program at Grammarly Dima Tiagulskyi - Software Engineer, Security Team
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 70. ● Early Life ○ https://twitter.com/badthingsdaily ○ https://enterprise.verizon.com/resources/reports/dbir/ ○ https://krebsonsecurity.com/ ○ https://www.loopio.com/blog/respond-security-questionnaires-3 ● Bug Bounty ○ https://danielmiessler.com/study/security-assessment-types/ ○ https://hackerone.com/grammarly ○ https://www.bugcrowd.com/ ○ https://hackerone.com/dropbox ○ https://securitytxt.org/ References
  • 71. References ● Jurassic CorpSec ○ Building Identity for an Open Perimeter ○ https://www.gartner.com/reviews/market/access-management ○ https://support.1password.com/create-share-vaults/ ○ https://aws.amazon.com/blogs/aws/built-in-authentication-in-alb/ ● Protecting Endpoints ○ https://www.jamf.com/ ○ https://en.wikipedia.org/wiki/Endpoint_Detection_and_Response ○ Configure an external recipient warning ● Security Team ○ https://about.gitlab.com/handbook/engineering/security/#security-department ○ https://www.owasp.org/index.php/OWASP_SAMM_Project ○ https://www.cisecurity.org/controls/cis-controls-list/
  • 72. ● Incident Detection and Response ○ https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Auditing.html ○ https://www.dmtf.org/standards/cadf ○ https://aws.amazon.com/products/security/ ○ https://www.sumologic.com/security/ ○ https://www.cisecurity.org/cis-benchmarks/ ● Infrastructure ○ https://aws.amazon.com/organizations/ ○ https://aws.amazon.com/controltower/ ○ https://aws.amazon.com/blogs/compute/refreshing-an-amazon-ecs-container-instance-cluster-with-a-new-ami/ ● Abuse Research and Infrastructure ○ https://www.troyhunt.com/ ○ https://elie.net/ References
  • 73. ● Security Culture ○ https://www.owasp.org/index.php/Security_Champions_Playbook ○ https://www.amazon.com/Securing-DevOps-Security-Julien-Vehent/dp/1617294136 ○ https://www.amazon.com/Agile-Application-Security-Enabling-Continuous/dp/1491938846 ● OWASP ○ https://www.owasp.org/index.php/OWASP_SAMM_Project ○ https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project ○ https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project ○ https://cheatsheetseries.owasp.org/ ● Integrating Security in Development ○ https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP ○ https://report-uri.com/ ○ https://web.dev/samesite-cookies-explained/ ○ https://www.chromium.org/updates/same-site ○ https://www.synopsys.com/software-integrity/security-testing/software-composition-analysis.html References