![Spring Security(Third Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/477/36700477/b_36700477.jpg)
上QQ阅读APP看书,第一时间看更新
Security audit
It's early in the morning at your job as a software developer for the Jim Bob Circle Pants Online Calendar (JBCPCalendar.com), and you're halfway through your first cup of coffee when you get the following email from your supervisor:
![](https://epubservercos.yuewen.com/793C02/19470400801603306/epubprivate/OEBPS/Images/Chapter_35.jpg?sign=1738847318-Kk0vHGDoluuTW5UXer8uxbY3CvMFhBza-0-d29629dd31315e1ec3353e410dfea89e)
What? You didn't think about security when you designed the application? In fact, at this point, you are not even sure what a security audit is. Sounds like you'll have a lot to learn from the security auditors! Later in this chapter, we will review what an audit is, along with the results of an audit. First, let's spend a bit of time examining the application that's under review.