Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
...
Use Prepared Statements: To prevent SQL injection, use prepared statements. A prepared statement is a prepared statement is a precompiled SQL Query that can help prevent SQL injection attacks by ensuring that user input is treated as data, not executable code
Use the SQL escape parameter in Hash Variables: If the query is a hash variable, use the ?sql
escape parameter, which ensures the query is handled safely, and the data is processed properly by the server.
Ensure that user input is validated both on the client-side and server-side. This includes validating form fields such as email addresses, dates, and other inputs. By validating input data before sending it to the server, you can ensure that malicious data is filtered out before it reaches the database or server-side processing.
When dealing with sensitive user data, it is essential to secure this data both in transit and at rest. At the server level, ensure that sensitive data is encrypted before being stored in the database.
...
In addition to encrypting data at rest, you should also ensure that data is encrypted while in transit. Use SSL (Secure Sockets Layer) or TLS (Transport Layer Security) to encrypt communications between the client and server. This protects data from being intercepted by attackers during transmission.
...
Designing and building a secure app using the Joget low-code platform involves understanding and addressing security concerns both at the front end and server sideat the back end. By implementing proper permissions for UI elements, protecting forms, preventing SQL injection, and securing data with encryption, and ensuring secure communications, you can safeguard your app and its data. Regular updates and proactive monitoring will help keep your app secure against evolving threats, ensuring a robust, safe, and trustworthy experience for all users.