Explore some of the most common attacks against Go applications, as well as how to prevent and defend against those threats.
Overview
Syllabus
Introduction
- Why care about security?
- What you should know
- Security risks overview
- CVEs
- OWASP Top 10
- Case studies
- Overview of input processing
- SQL injection
- Setting timeouts
- Size limiting
- Input validation
- Challenge: Secure input
- Solution: Secure input
- Overview of output issues
- Cross-site scripting (XSS)
- Sensitive data
- Terminating HTTP handlers on error
- Challenge: Securing output
- Solution: Securing output
- Overview of authentication issues
- Authentication
- Authorization
- Challenge: Limit access
- Solution: Limit access
- Overview of infrastructure security
- Security configuration
- Keeping secrets
- Dependency management
- Logging and metrics
- Challenge: Secure project
- Solution: Secure project
- Include security in your process
- The security mindset
- Linters
- Security audits
- Next steps
Taught by
Miki Tebeka