Friday 26 December 2014

Validation

Ensure that you correctly handle validation errors, and avoid exposing sensitive
information in error messages. In addition, ensure that you log validation failures
to assist in the detection of malicious activity.

Reference : Microsoft Application Architecture Guide (Second Edition)

No comments:

Post a Comment