37 lines
2.4 KiB
Plaintext
37 lines
2.4 KiB
Plaintext
7. References
|
||
7.1 https://docs.djangoproject.com/en/2.2/topics/security/
|
||
This document is an overview of Django’s security features.
|
||
It includes advice on securing a Django-powered site.
|
||
7.2 https://docs.djangoproject.com/en/2.2/internals/security/
|
||
Django’s security policies
|
||
Django’s development team is strongly committed to responsible reporting
|
||
and disclosure of security-related issues. As such, we’ve adopted and follow
|
||
a set of policies which conform to that ideal and are geared toward allowing
|
||
us to deliver timely security updates to the official distribution of Django,
|
||
as well as to third-party distributions.
|
||
7.3 https://docs.djangoproject.com/en/2.2/howto/deployment/checklist/
|
||
Deployment checklist
|
||
The Internet is a hostile environment. Before deploying your Django project,
|
||
you should take some time to review your settings, with security, performance,
|
||
and operations in mind.
|
||
7.4 https://docs.djangoproject.com/en/2.2/releases/security/
|
||
Archive of security issues. CVE.
|
||
7.5 https://medium.com/@ksarthak4ever/django-and-web-security-headers-d72a9e54155e
|
||
Django and Web Security Headers
|
||
7.6 https://bandit.readthedocs.io/en/latest/config.html
|
||
Bandit is a tool designed to find common security issues in Python code. To do this,
|
||
Bandit processes each file, builds an AST from it, and runs appropriate plugins
|
||
against the AST nodes. Once Bandit has finished scanning all the files, it generates a report.
|
||
7.7 https://snyk.io/blog/python-security-best-practices-cheat-sheet/
|
||
Python Security Best Practices Cheat Sheet
|
||
In this installment of our cheat sheet series, we’re going to cover the best practices
|
||
for securely using Python.
|
||
7.8 https://github.com/sellonen/django-security-tips
|
||
The aim of this guide/repository is to learn and promote secure system administration tips and
|
||
practices in the Django community. My motivation is that most articles that focus on getting a
|
||
Django application up and running do not talk much about security, yet database security guides
|
||
often feel too abstract and intimidating for newcomers.
|
||
7.9 https://nvisium.com/blog/2019/04/18/django-vs-the-owasp-top-10-part-1.html
|
||
Django’s built-in mitigations for some of the most common risks listed in the OWASP Top 10
|
||
|