Slide 19
Slide 19 text
@chriseng
Empower, Within Limits
• Day-to-day tasks such as story grooming, code reviews
• Make grooming checklists: new features, new architectures,
new security controls, new forms, fixes for pen test finding, any
code that touches AuthN, AuthZ, cryptography, etc.
• Focus code review goals to security controls they have proven
they understand, e.g. data validation, parameterization,
encoding, etc.