{"id":11751,"date":"2021-05-06T09:34:03","date_gmt":"2021-05-06T07:34:03","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-analysis-pentests\/code-review\/"},"modified":"2024-08-05T13:15:56","modified_gmt":"2024-08-05T11:15:56","slug":"code-review","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/code-review\/","title":{"rendered":"Code Review"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-analysis-header-allgemein.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px||62px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Code Review<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|61px|0px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>We put your code under the microscope<\/h2>\n<p>Are you wondering if your application is secure? We point out potential security vulnerabilities in your source code. Most security problems are caused by critical vulnerabilities in applications. Code reviews identify security gaps in the source code thus minimizing potential risks.<\/p>\n<p>A code review is something you should seriously consider, especially for security-relevant applications that provide access to sensitive data. The result of this code review is a report that we send you specifying the vulnerabilities analyzed in the source code according to their criticality, as well as detailed suggestions on how to eliminate them. That way you create more security. Right from the start.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our methods<\/h2>\n<p>In an analysis, we follow a standardized procedure in which the entire source code, or parts of it, are first subjected to an automated scan for vulnerabilities. In the next step, the results of this scan are examined for correctness in a manual process and further attack vectors, for example in the business logic of the application, are identified.  <\/p>\n<p><span>Depending on the kind of application, we use static or manual analysis methods. In doing so, we either look at a section or at your complete application. We check compliance with recognized secure coding guidelines and best practices. Our methods support all common programming languages such as Java, C+, PHP, Python and many more.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"2px||16px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_tabs _builder_version=\"4.27.0\" _module_preset=\"default\" body_font=\"|300|||||||\" body_text_align=\"left\" body_text_color=\"#2E353D\" body_font_size=\"16px\" tab_font=\"|300|||||||\" tab_font_size=\"18px\" body_link_font=\"|300|||||||\" body_link_text_color=\"#F07F1D\" custom_margin=\"50px|0px|50px|0px|true|true\" border_radii=\"on|5px|5px|5px|5px\" box_shadow_style=\"preset1\" box_shadow_spread=\"-8px\" box_shadow_color=\"rgba(0,0,0,0.23)\" global_colors_info=\"{}\" active_tab_text_color__hover_enabled=\"on|desktop\" active_tab_text_color__hover=\"#F07F1D\" tab_text_color__hover_enabled=\"on|hover\" tab_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\"][et_pb_tab title=\"Static Analysis\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>In static analysis procedures, also known as SAST (Static Application Security Testing), automated tools are used to identify vulnerabilities. The code is then analyzed manually on the basis of the tool results. The focus here is on reducing false positives and identifying other vulnerabilities that are difficult or impossible to detect using code scanners. Throughout the entire process, the source code of the application is checked without executing it.<\/p>\n<p>[\/et_pb_tab][et_pb_tab title=\"Dynamic Analysis\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Purely static analysis methods reach their limits when errors are based on business logic. This is where the dynamic analysis method used by our experts comes into play. This procedure mixes the SAST and DAST (Dynamic Application Security Testing) models in order to achieve optimal results. The procedure is largely identical to a static analysis, but supplemented by the option of checking the identified vulnerabilities for exploitability using a running application configured close to production. This gives you the best possible picture of the security level of your applications. <\/p>\n<p>[\/et_pb_tab][\/et_pb_tabs][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"70px|0px|51px|0px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our recommendations for you<\/h2>\n<p> In order to obtain a holistic picture of the security level of your application, we recommend carrying out a code review in the form of a dynamic analysis. It is essential that the results are reviewed by an expert in order to provide a realistic assessment. We specifically search for errors in the application and business logic by focusing on typical vulnerabilities such as injection, directory traversal, buffer overflow, privilege escalation, etc. We also analyze the cryptography methods used. We also analyze the cryptographic methods used and check exception handling. Errors in the use of control structures can also be discovered during the comprehensive check.\n<\/p>\n<p>[\/et_pb_text][et_pb_divider color=\"#F6F6F6\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|0px|auto|false|false\" custom_padding=\"||47px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-HeroLab-Jahresbericht-2020.jpg\" title_text=\"usd-siegel-secure-payment\" _builder_version=\"4.27.0\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>PCI DSS Code Review<\/h3>\n<div class=\"x-container max width offset\">\n<aside class=\"x-sidebar right\" role=\"complementary\">\n<div id=\"text-48\" class=\"widget widget_text\">\n<div class=\"textwidget\">\n<div class=\"e cs-content x-global-block x-global-block-20959\">\n<div class=\"e20959-1 x-section\">\n<div class=\"e20959-2 x-container max width\">\n<div class=\"e20959-3 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<p>The PCI Security Standards Council has established a code review requirement. According to PCI DSS v4.0 Requirement 6.2.3, custom code that can be accessed internally or externally must be reviewed to identify potential coding vulnerabilities.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/aside>\n<\/div>\n<footer class=\"x-colophon top\">\n<div class=\"x-container max width\">\n<div class=\"x-column x-md x-1-4\">\n<div id=\"nav_menu-2\" class=\"widget widget_nav_menu\"><\/div>\n<\/div>\n<\/div>\n<\/footer>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Code ReviewWe put your code under the microscope Are you wondering if your application is secure? We point out potential security vulnerabilities in your source code. Most security problems are caused by critical vulnerabilities in applications. Code reviews identify security gaps in the source code thus minimizing potential risks. A code review is something you [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":15265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11751","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11751"}],"version-history":[{"count":6,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11751\/revisions"}],"predecessor-version":[{"id":51578,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11751\/revisions\/51578"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}