# Secure Development

# Secure Development Principles

We at Witivio know you care about how your personal information is used and shared, and we take your privacy seriously by implementing the most rigorous practices for our developments.

These best practices are gounded by the OWASP Security Design Principles (opens new window):

  • Minimize attack surface area : The aim for secure development is to reduce the overall risk by reducing the attack surface area.
  • Establish secure defaults: By default, the experience should be secure, and it should be up to the user to reduce their security - if they are allowed.
  • Principle of Least privilege: The principle of least privilege recommends that accounts have the least amount of privilege required to perform their business processes. See Microsoft Graph Permissions as an example.
  • Principle of Defense in depth: The principle of defense in depth suggests that where one control would be reasonable, more controls that approach risks in different fashions are better.
  • Fail securely: Applications regularly fail to process transactions for many reasons. How they fail can determine if an application is secure or not.
  • Don't trust services: Many organizations utilize the processing capabilities of third party partners, who more than likely have differing security policies and posture than you. Therefore, implicit trust of externally run systems is not warranted. All external systems should be treated in a similar fashion.
  • Separation of duties: Certain roles have different levels of trust than normal users. In particular, administrators are different to normal users. In general, administrators should not be users of the application.
  • Avoid security by obscurity: Security through obscurity is a weak security control, and nearly always fails when it is the only control.
  • Keep security simple: Developers should avoid the use of double negatives and complex architectures when a simpler approach would be faster and simpler.
  • Fix security issues correctly: Once a security issue has been identified, it is important to develop a test for it, and to understand the root cause of the issue. When design patterns are used, it is likely that the security issue is widespread amongst all code bases, so developing the right fix without introducing regressions is essential.
  • Secure Release Process: Aside from the Secure Development Principles, we're using several tools during our release process as a gateway before each release and deployment, to reduce risks and avoid common pitfalls.

# Microsoft Azure best practices

Witivio applies best practices in Web and Cloud development. During development, a code review process is applied at the end of each developed feature. The objective is to find potential bugs or vulnerabilities or to correct design errors in order to improve the quality, maintainability and security of the software. Microsoft Azure Architecture patterns (opens new window)

# Standard JavaScript Style

JavaScript Standard Style (opens new window)

This module enforces JavaScript development best practices in different ways:

  • Automatically format code: Ease code maintenance and prevents messy or inconsistent code.
  • Catch style issues & programmer errors early: Save precious code review time by eliminating back-and-forth between reviewer & contributor, avoiding common style issues that may impact security.

Learn more about Standard JavaScript Style (opens new window) and its Enforced Rules (opens new window)

# ESLint Security

This security plugin helps us to identify potential security hotspots during development, take proactive countermeasure and therefore enforce our security best practices.

Learn more about ESLint Security Plugin (opens new window) and Security Rules (opens new window)

# NPM Audit

This tool from Node Package Manager (opens new window) performs a moment-in-time security review of our project's dependency tree and looks for known vulnerabilities.
Audit reports contain information about potential security vulnerabilities in our dependencies and helps us fix a potential vulnerability by providing recommendations for further troubleshooting.

Learn more about NPM Audit (opens new window)

# Code review

code review

# Deployment process

Deployment process