Page 36 - Informatics, October 2022
P. 36

Technology Updates








              Crowdsourcing



              Software Security




              Enhancing Security by Secure Code

              Collaboration amongst Developers





              Edited by MOHAN DAS VISWAM





                    riting secure code in the Software                                 To fully embrace the phenomenon of secure
                    Development Life Cycle (SDLC) phase and                          coding, one needs to create a secure development
              Wadapting to security by design should be   Software vulnerabilities are always   environment that is built on a reliable and secure
              a top priority for good developers. The benefit of                     IT infrastructure using secure hardware, software,
              secure code is that many of the potential exploits   on the rise. They may exist at any   services, and service providers.
              and attacks can be simply prevented by writing   layer  in  the  software,  including   However, building secure software by writing
              better and more secure code.
                                                   the operating system, application   secure code is easier said than done because
              What is Secure Coding?                                                 the developers building the software normally
                Secure coding,  or secure  programming,   server, database server, etc. If not   have  less  idea  of  vulnerabilities,  exploits,  and
              involves writing code in a high-level language that   addressed, they may get exploited,   remediation.
              follows strict principles to prevent the potential                       Secure  software  engineering,  including
              vulnerabilities that could expose data or cause   and organisation’s data may be   secure coding concepts, is also not taught in the
              harm  to  a  system.  It  is  more  than  just  writing,   breached,  and in  a  worst case   college. Moreover, in several organisations, both
              compiling, and releasing code into applications.                       development  and  security  teams  may  also  be
                                                   scenario, even a ransomware call   working in silos.
                                                   may come up. As more and more       To address this problem of writing secure code,
                                                   government services go online,    NIC has designed and developed a secure code
                                                                                     crowdsourcing platform for exchanging secure
                                                   insecure web apps of important    code among the NIC developer community.
                             Rajesh Mishra
                             Sr. Technical Director  government services (G2B, B2G, G2C,   Crowdsourcing is the practice of obtaining
                             mrajesh@nic.in                                          information or input into a task or project by
                                                   C2G and G2G) can result in data theft,   enlisting the services of a large number of people,
                                                   loss of confidentiality, financial   either paid or unpaid, typically via the internet.
                                                                                       The sole purpose of this platform is to allow
                                                   losses, and service unavailability.   for the voluntary contribution of secure code
                            Anil Kumar Jha         The  industry  has  come  up  with  a   snippets by NIC developers that may help other
                            Sr. Technical Director                                   NIC developers in patching security vulnerabilities
                            aniljha@nic.in         plethora of tools and technologies   with ease that are found during the app audit
                                                   to address these issues, but one of   process. NIC developers may use this platform
                                                                                     to gather more information and best practices to
                                                   the cheapest and most economical   be followed during the development of web or
                                                   ways is to develop a secure SDLC and   mobile apps.
                            Rohit K. Sharma
                            Scientist-C            write secure code.                  This Secure Code Crowdsourcing platform
                            rohit.kumar89@nic.in                                     can be accessed by the NIC developers using
                                                                                     their Parichay credentials. (Link to the platform:
                                                                                     https://x-seccode.nic.in)




              36  informatics.nic.in  October 2022
   31   32   33   34   35   36   37   38   39   40   41