As a best-selling author, I invite you to explore my books on Amazon. Don't forget to follow me on Medium and show your support. Thank you! Your support means the world!
Secure Environment Management
Managing secrets securely is critical. I've seen too many incidents from leaked credentials in source code. For local development, I rely on python-dotenv
to load environment variables from a .env
file excluded from version control. In production, cloud vaults like AWS Secrets Manager provide automatic rotation and access control. Here's how I integrate Azure Key Vault:
from azure.identity import ManagedIdentityCredential
from azure.keyvault.secrets import SecretClient
import os
def fetch_secret(secret_name: str) -> str:
if os.getenv('ENVIRONMENT') == 'prod':
credential = ManagedIdentityCredential()
vault_url = os.getenv('AZURE_VAULT_URL')
client = SecretClient(vault_url=vault_url, credential=credential)
return client.get_secret(secret_name).value
else: # Local development
return os.getenv(secret_name)
# Usage
db_password = fetch_secret("POSTGRES_PASSWORD")
I always verify .gitignore
contains .env
and use IAM roles instead of static credentials in cloud environments.
SQL Injection Defense
Parameterized queries are non-negotiable. Early in my career, I witnessed a data breach from concatenated SQL strings. ORMs like SQLAlchemy handle sanitization automatically:
from sqlalchemy import text
# Safe ORM query
result = session.query(User).filter(User.email == email_input).all()
# Safe raw SQL with parameters
query = text("SELECT * FROM transactions WHERE user_id = :user_id")
result = session.execute(query, {"user_id": user_id})
For dynamic table/column names (rarely needed), I use allowlists:
ALLOWED_COLUMNS = {"name", "email", "created_at"}
def safe_query(column: str, value: str):
if column not in ALLOWED_COLUMNS:
raise ValueError("Invalid column")
return f"SELECT * FROM users WHERE {column} = %s", (value,)
Password Hashing Implementation
Storing passwords plaintext is unforgivable. I prefer bcrypt for its battle-tested security:
import bcrypt
def create_user(password: str):
salt = bcrypt.gensalt(rounds=12) # 12 rounds takes ~0.3s on modern hardware
hashed = bcrypt.hashpw(password.encode(), salt)
store_in_db(hashed) # Save binary hash
def authenticate(input_password: str, stored_hash: bytes) -> bool:
return bcrypt.checkpw(input_password.encode(), stored_hash)
For new projects, I consider Argon2 via the argon2-cffi
package when regulatory requirements demand memory-hard algorithms.
HTTPS Enforcement
Encrypting traffic is basic hygiene. In FastAPI, production deployments enforce HTTPS automatically. For custom TCP services:
import ssl
from socketserver import ThreadingTCPServer
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
context.load_cert_chain('server.crt', 'server.key')
class SecureServer(ThreadingTCPServer):
def __init__(self, server_address):
super().__init__(server_address, MyHandler)
self.socket = context.wrap_socket(self.socket, server_side=True)
I always set HSTS headers and redirect HTTP → HTTPS in production:
# FastAPI middleware
@app.middleware("http")
async def force_https(request: Request, call_next):
if request.url.scheme == 'http':
url = request.url.replace(scheme='https')
return RedirectResponse(url)
return await call_next(request)
XSS Mitigation with CSP
Content Security Policy headers saved my team from persistent XSS attacks. This configuration blocks inline scripts and external resources:
# Django middleware example
class SecurityHeadersMiddleware:
def __init__(self, get_response):
self.get_response = get_response
def __call__(self, request):
response = self.get_response(request)
response["Content-Security-Policy"] = (
"default-src 'self'; "
"script-src 'self' 'nonce-{random}'; "
"style-src 'self' fonts.googleapis.com; "
"img-src 'self' data:; "
"connect-src 'self'; "
"frame-ancestors 'none';"
)
return response
I generate unique nonces per request for legitimate inline scripts.
Dependency Scanning
Vulnerable dependencies cause 60% of breaches I've investigated. My CI pipeline blocks builds with known CVEs:
# .github/workflows/security.yml
name: Security Scan
on: [push]
jobs:
dependency_scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Set up Python
uses: actions/setup-python@v5
- name: Install safety
run: pip install safety
- name: Scan dependencies
run: safety check --output json > report.json
continue-on-error: true
- name: Fail on criticals
run: |
jq '[.vulnerabilities[] | select(.severity == "CRITICAL")] | length' report.json
if [ $(jq 'length' report.json) -gt 0 ]; then exit 1; fi
Safe Deserialization
I never deserialize untrusted data with pickle
. This pattern validates structure with Pydantic:
from pydantic import BaseModel, ValidationError
import json
class UserUpdate(BaseModel):
user_id: int
attributes: dict[str, str]
def apply_update(json_data: str):
try:
data = json.loads(json_data)
update = UserUpdate(**data)
# Process valid update
except (json.JSONDecodeError, ValidationError) as e:
log_error(f"Invalid payload: {e}")
For complex data, I use Marshmallow schemas with strict field definitions.
Ongoing Security Practices
Security isn't a one-time task. I schedule quarterly penetration tests using OWASP ZAP and Burp Suite. My checklist includes:
- Reviewing access logs for abnormal patterns
- Rotating secrets every 90 days
- Running
bandit
static analysis weekly - Testing disaster recovery procedures
# Bandit integration example
import subprocess
def run_security_scan():
result = subprocess.run(
["bandit", "-r", "src/", "-f", "json", "-o", "bandit.json"],
capture_output=True
)
if result.returncode != 0:
alert_team("Static analysis found issues")
These practices form a layered defense strategy that adapts to emerging threats while maintaining development velocity.
📘 Checkout my latest ebook for free on my channel!
Be sure to like, share, comment, and subscribe to the channel!
101 Books
101 Books is an AI-driven publishing company co-founded by author Aarav Joshi. By leveraging advanced AI technology, we keep our publishing costs incredibly low—some books are priced as low as $4—making quality knowledge accessible to everyone.
Check out our book Golang Clean Code available on Amazon.
Stay tuned for updates and exciting news. When shopping for books, search for Aarav Joshi to find more of our titles. Use the provided link to enjoy special discounts!
Our Creations
Be sure to check out our creations:
Investor Central | Investor Central Spanish | Investor Central German | Smart Living | Epochs & Echoes | Puzzling Mysteries | Hindutva | Elite Dev | JS Schools
We are on Medium
Tech Koala Insights | Epochs & Echoes World | Investor Central Medium | Puzzling Mysteries Medium | Science & Epochs Medium | Modern Hindutva
Top comments (0)