PowerPoint Presentation: http://www.tatvasoft.co.uk/ Protection from undesirable security terrors is the only goal of setting up technical requirement for taking on safeguarded web application development process. Here is an example, a technical team may make a decision that a program will expire right after 10 minutes of inactivity and the user must once again log-in, before processing, there needs to be an affirmation of all incoming data, only Port 80 will be open on production web servers etc. This way anytime web application development company documents the technical requirements to create a secure web application, it helps the later stages of web application development life cycle also. The next step that will follow after determining the application security in the functional and technical needs for the application is its intro in the design and evaluation phase. Included in the security, the development team needs to make use of secure codes, the QA team would need to make and execute its tests in order to examine the security of the application, and also web developers need to deploy the applications in a very protected environment. The post deployment exercise contains completing security audits regularly to make certain that a web application stays secure.