Developer Security — Study Guide

Review these materials before taking the exam. All links open in the Krumware Confluence IO space.

Key Concepts

  • No hardcoded secrets. Use secrets managers (Vault, KMS, GitHub Secrets, K8s Secrets). Add .env to .gitignore before first commit.
  • Committed secrets are compromised. Rotate immediately, update secrets management, revoke old key, report to IT.
  • Input validation: Server-side, at system boundaries, using framework-provided tools. Reject unexpected input.
  • Database: Use ORMs or parameterized queries. Never concatenate user input into SQL.
  • No custom crypto. Use established libraries (OpenSSL, NaCl, platform KMS).
  • Dependabot timelines: Critical = same day, High = 1 week, Medium = 30 days, Low = 90 days.
  • Containers: Non-root user, minimal base images, pinned versions (no :latest), build through CI/CD, scan before deploy.
  • Code review: Check for secrets, input validation, parameterized queries, no sensitive data in logs/errors, proper auth, license compatibility.

Policy References

DocumentRelevance
TRN-007 Developer Security Quick ReferenceFull reference — secure coding checklists, Dependabot, secret scanning, container security, pre-deployment
POL-012 Secure Development PolicyGoverning policy — secure coding, code review, dependency management, container security, CI/CD
POL-005 Vulnerability Management PolicyVulnerability patching timelines, Dependabot response requirements
STD-002 Encryption StandardEncryption requirements — TLS, AES-256, key management
POL-003 Secure Configuration & Change Management PolicyChange management, configuration baselines, deployment approvals

Related Playbooks

DocumentScenario
PLB-003 Credential Compromise PlaybookWhen a secret is committed to git or credentials are exposed
PLB-002 Data Breach PlaybookWhen a vulnerability leads to data exposure

Quick Reference Tables

Dependabot Response Timelines

SeverityTimeline
CriticalSame day
HighWithin 1 week
MediumWithin 30 days
LowWithin 90 days

Where Secrets Belong

LocationOK?
Kubernetes Secrets, Vault, Cloud KMS, GitHub Secrets, env vars (runtime)Yes
Source code, config files, Dockerfiles, README, Slack, email, comments, .env in gitNo