What Is Secure Coding? Overview and Best Practices
Secure coding is the practice of developing software that is resistant to security vulnerabilities by applying security best practices, techniques, and tools early in development.
This cheat sheet is designed for:
Platform Engineers / Bitbucket Administrators: Harden configurations for Cloud or Data Center deployments, manage user lifecycles, and standardize secure defaults across the workspace.
DevSecOps & DevOps Professionals: Secure the CI/CD assembly line by locking down runner access, securing pipeline secrets, and embedding SCA and container scanning.
Security Engineers: Apply proven hardening and monitoring strategies to prevent token abuse, secrets leakage, and supply chain compromise using native Bitbucket controls.
Security Leaders & IT Managers: Move from basic hygiene to a robust, defensible security posture with a practical roadmap to reduce organizational risk.
Compliance & Audit Teams: Improve visibility through advanced auditing and use Atlassian Guard to enforce org-wide settings and regulatory traceability.
What’s included?
Centralized Identity & Access (IAM): Strategies for enforcing MFA, utilizing SCIM for auto-deprovisioning, and setting context-aware conditional access policies.
Repository & Project Lock down: How to mandate branch protection, require successful builds before merging, and utilize the Bitbucket hierarchy for granular control.
CI/CD Pipeline Hardening: Best practices for isolating runner network access and securing secrets using masked variables or external vaults like HashiCorp Vault.
Secrets & Sensitive Data Protection: Guidance on deploying automated secrets scanning across full Git history and using pre-receive hooks to block leaks.
Self-Hosted (Data Center) Hardening: Specific controls for patching, vetting third-party plugins, and ensuring backups are "more than just a theory" through test restores.
Secure coding is the practice of developing software that is resistant to security vulnerabilities by applying security best practices, techniques, and tools early in development.
Learn about CI/CD pipeline security best practices to protect your software lifecycle from vulnerabilities and attacks while maintaining development velocity.
Learn how policy as code helps teams enforce security, reduce misconfigurations, and improve cloud governance with automated rules across environments.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."