Navigation Lexico Realty Lexico Realty
CALL US NOW
(954) 328 - 6498
  • Join Mailing List
  • Home
  • Contact

web application development checklist

Posted in Uncategorized on January 8, 2021 by Leave a Comment

The demands for companies to build Web Applications are growing substantially. 1. Using an App Development Checklist There’s plenty that goes into developing a solid app, but it’s ultimately a matter of understanding your industry, your users, and the best ways to represent your brand. It is a pain to configure, but worthwhile. Collaboration Between Development and Operations. 9) Add request throttling to prevent brute force attacks or denial of service attacks. Without cookies, you will not be able to view videos, contact chat or use other site features. Eg: http://domain.com/.env. Ensure that no resources are enumerable in your public APIs. Make sure your site follows web development best practices. 7) Make sure file uploads are allowing only the right file types. Never directly inject user content into responses. However, you can make the entire web design process easier by coming up with a practical checklist. You should never need SSH to access or retrieve logs. This is a checklist which you can use to check web applications. Easily build business goodwill and assets based on audience reach, popularity, technology and potential growth 1. NEVER email passwords or credentials to team members. Restrict outgoing IP and port traffic to minimize APTs and “botification”. Never use TLS for just the login form. 13) Cookies must be httpOnly and secure and be scoped by path and domain. Xenia Liashko; 2019-11-21 17:37:00; Many web applications (WA) have a special place in our daily lives, from Google … 14) Prevent reflected Cross-site scripting by validating the inputs. Get In Touch With Us Today. For example: if using NPM, don’t use npm-mysql, use npm-mysql2 which supports prepared statements. At Axis Web Art, being a web development company in India , we believe in complete transparency and share a detailed contract we prepare for every new project. While developing cloud services at SenseDeep, we wanted to use CloudWatch as the foundation for our logging infrastructure, but we needed a better, simple log viewer that supported fast smooth scrolling and better log data presentation. Don’t invent your own — it is hard to get it right in all scenarios. Create test and staging resources in a separate AWS account to that used by production resources. Web servers should be on logically separated network segments from the application and database servers in order to provide different levels and types of defenses for each type of server. Check if the dropdown data is not truncated due to the field size. Core Progressive Web App checklist # If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. For additional web development best practices, see the following resources: The Fix It Sample Application - Best Practices. SAP, Navision, etc. In such instances it may be important to ascertain the security implications with the requisite vendor as well as with the in house development team to ascertain the security implications of the modification. Cedex technologies is a young and vibrant software development company focusing on new age Low barrier of entry. Manual tests are ideal for ad-hoc testing because they take little time to prepare. Progressive Web Apps (PWA) are built and enhanced with modern APIs to deliver enhanced capabilities, reliability, and installability while reaching anyone, anywhere, on any device with a single codebase. Faster test preparation. Consider generating validation code from API specifications using a tool like Swagger, it is more reliable than hand-generated code. Companies want to streamline their internal departments and functions, operations, sales and project management, etc. (See Immutable Infrastructure Can Be More Secure). Run applications and containers with minimal privilege and never as root (Note: Docker runs apps as root by default). This can be turned on if you suffer a DDOS attack and otherwise function as your DNS lookup. Have a practiced security incident plan. All too often, companies take a disorganized approach to the situation and end up accomplishing next to nothing. If you think it is easy, you are either a higher form of life or you have a painful awakening ahead of you. Always validate and encode user input before displaying. For node, see NPM uuid. ER Studio. Use https://observatory.mozilla.org to score your site. A custom web application development service provider which can help you meet your business objectives and enhance the visibility and conversion of your digital web estate with its superior market understanding. Build the software from secured, isolated development systems. Make sure that DOS attacks on your APIs won’t cripple your site. For example, a GET request might read the resources, POST would create a new resource, and DELETE would delete an existing resource. AWS and CloudFlare both have excellent offerings. Ensure that users are fully authenticated and authorized appropriately when using your APIs. No matter what your project is, it will involve some level of design expertise. Using SSH regularly, typically means you have not automated an important task. Train staff (especially senior staff) as to the dangers and techniques used in security social engineering. Secure development systems with equal vigilance to what you use for production systems. Do penetration testing — hack yourself, but also have someone other than you do pen testing as well. Fusion. Use minimal privilege for the database access user account. Use CSP without allowing unsafe-* backdoors. Have a threat model that describes what you are defending against. 3) Use X-Frame-Option, X-XSS-Protection headers in client responses. Use encryption for data identifying users and sensitive data like access tokens, email addresses or billing details if possible (this will restrict queries to exact match lookups). Use minimal access privilege for all ops and developer staff. I hope you will consider them seriously when creating a web application. 8) Prevent accessing .env via public URL. A Web Application is a program that runs on a browser to accomplish specific functions. Make sure all backups are stored encrypted as well. 2. technologies. I agree Nevermind. To help you create the best possible experience, use the core and optimal checklists and recommendations to guide you.. Map out design. Since web applications are naturally very diverse, the template is kept rather generic. Use TLS for the entire site, not just login forms and responses. The appendix to this e-book lists a number of best practices that were implemented in the Fix It application. machine learning and artificial intelligence. Developing secure, robust web applications in the cloud is hard, very hard. Make sure you plan your checklist with the scripts and languages that you will be using during the coding process. Web Application Development Checklist. Today, QA for web Testing is THE most important step in the web application development lifecycle, that decides how your app is perceived by your end-users. 1. Use an Intrusion Detection System to minimize APTs. This checklist is simple, and by no means complete. Ensure you can do upgrades without downtime. Looking for a reliable partner for your next project? Use centralized logging for all apps, servers and services. If not using Immutable Infrastructure (bad), ensure you have an automated system to patch and update all servers and regularly update your AMIs and rotate your servers to prevent long-lived APTs. Never use untrusted user input in SQL statements or other server-side logic. Web Development Lifecycle: A Web project lifecycle is envisioned for all applications or developments to appear on the EPRI Web site. If your database supports low cost encryption at rest (like AWS Aurora), then enable that to secure data on disk. This means O/S, libraries and packages. Password Managers Reviewed. If subject to GDPR, make sure you really understand the requirements and design it in from the start. Immutable Infrastructure Can Be More Secure. For CMS fans, don't store your credentials in a file in the document directory. This web site uses cookies to provide you with a better viewing experience. 1) Functionality of The App A key… Web Developer Checklist If you must use SSH, only use public key authentication and not passwords. Fully prevent SQL injection by only using SQL prepared statements. You can use it to increase the likelihood that you will cover all the essential parts. ... including application performance management tools, can help monitor your server and application health from every angle. The complete app development checklist white paper is available for download here.. Building mobile apps takes more planning than most assume. Infrastructure should be defined as “code” and be able to be recreated at the push of a button. Perform Chaos testing to determine how your service behaves under stress. Use firewalls, virtual private networks and cloud Security Groups to restrict and control inbound and outbound traffic to/from appropriate destinations. Schedule dev servers to be powered down after hours when not required. Consider the OWASP test checklist to guide your test hacking. Unlike Selenium code, manual tests are easy to change. It understands structured log data for easy presentation and queries. And, of course, all the planning in the world won’t help if you hire a subpar developer. Create immutable hosts instead of long-lived servers that you patch and upgrade. Web application as part of ERP package: In some instances the web application may be an add on module of an ERP e.g. Proactively test your app beyond normal use. Blog post by Scott Hanselman, primarily about using async in ASP.NET Web Forms applications. Transitionally, use the strict-transport-security header to force HTTPS on all requests. The Apache/PHP/MySQL stack is immensely popular for web application development. 10) Make sure all SQL queries are safe from SQL injections. This checklist is simple, and by no means complete. I hope this checklist will prompt you through your entire development lifecycle to improve the security of your services. Debugging software ensures that it performs the desired functions flawlessly. Checklist of things you should before and after every deployment of your software to minimize potential problems and ensure that it ends with a beer! For some, it will represent a major change in design and thinking. This is useful to manage, required by GDPR and essential if hacked. All rights reserved. Following our awesome list of 101 tools for web designers and developers, it was time for actually figuring out every step needed to get a web design project done – from start to finish.So here it is – the ultimate checklist for the web designer/freelancer/agency starting a web design project. Consider using an authentication service like Auth0 or AWS Cognito. Don’t hard code secrets in your applications and definitely don't store in GitHub!. Don’t keep port 22 open on any AWS service groups on a permanent basis. Be very careful when configuring AWS security groups and peering VPCs which can inadvertently make services visible to the public. The ultimate checklist for all serious web developers building modern websites. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. Always use AWS IAM roles and not root credentials. 18) Don't keep database backup or source code backup on the public root. Certified Secure Checklist Web Application Secure Development Version 5.0 - 2020 Page 3 of 7 # Certified Secure Web Application Secure Development Checklist Result Ref 4.4 Never include content from untrusted (external) sources 4.5 Implement anti-caching measures for … Developer ToIT Application Services: Microsoft InterDev. 2) Make sure passwords, API tokens, session identifiers all are hashed. Redirect all HTTP request to HTTPS on the server as backup. Its components are powerful, versatile and Free. I hope you will consider them seriously when creating a web application. Use X-Frame-Option, X-XSS-Protection headers in client responses. Web development is not an isolated process. Template: Web Application Checklist. You can't hope to stay on top of web application security best practices without having a plan in place for doing so. This should be automated into the CI-CD process. While I try to keep the list tight and focused, please comment if you have an item that you think I should add to the list. Most of all, remember that security is a journey and cannot be "baked-in" to the product just before shipping. Setup a standard email account and web page dedicated for users to report security issues (security@example.com and /security). Web design and development may seem complicated because you will be dealing with coding, creating prototypes, dealing with clients, programming, and testing. It will ensure that users have a good experience when using the app. Create all infrastructure using a tool such as Terraform, and not via the cloud console. Privacy Policy and Terms of Use. It should list and prioritize the possible threats and actors. Host backend database and services on private VPCs that are not visible on any public network. I’ve been developing secure web applications for over 14 years and this list contains some of the more important issues that I’ve painfully learned over this period. And for that, the security development process should start with training and creating awareness. It has been re-organized from Version 1 and has a few new items by public demand (Thank you). Never write your own crypto and correctly initialize crypto with good random data. 19) If there are APIs, secure it with right Authentication methods. Don’t SSH into services except for one-off diagnosis. This is version 2 of the checklist. 5. Don't use GET requests with sensitive data or tokens in the URL as these will be logged on servers and proxies. Web Applications Development Checklists [2019] 1) Add CSRF token with every POST form submission. This means email addresses, personally identifying information and other personal information in general. This checklist from Web Pages That Suck is one of the most complete checklists out there. On AWS, consider CloudWatch with the SenseDeep Viewer. The most secure server is one that is powered down. 1) Add CSRF token with every POST form submission. Treat sensitive data like radioactive waste — i.e. 2) Make sure passwords, API tokens, session identifiers all are hashed. Never, EVER have any undocumented and unpublicized means of access to the device including back-door accounts (like "field-service"). Use a team-based password manager for all service passwords and credentials. Co-founder @ Cedex Technologies LLP | Building chatbots and Voice-first solutions. The IAO will ensure web servers are on logically separate network segments from the application and database servers if it is a tiered application. there is an real, large and ongoing cost to securing it, and one day it can hurt you. At a minimum, have rate limiters on your slower API paths and authentication related APIs like login and token generation routines. Store and distribute secrets using a key store designed for the purpose. Oftentimes, companies and individuals believe their business plan and app idea are rock solid, but they unintentionally gloss over key items that must be considered prior to any design or development begin. Keep a complete list of all the places you store sensitive information: databases, file systems, Dropbox, GitHub, Vault, Office docs and even the paper folder. 6) Add backend form validations for all the forms requests even if there is a front-end validation. Sit down with your IT security team to develop a detailed, actionable web application security plan. While security through obscurity is no protection, using non-standard ports will make it a little bit harder for attackers. Cookies must be httpOnly and secure and be scoped by path and domain. See Privacy Cheatsheet and Intro to GDPR. Website quality assurance includes quality testing in all areas of development such as documentation, coding, design, user … Don’t use the database root account and check for unused accounts and accounts with bad passwords. 4) Verify GET requests are only used to actually get data from the server, but never make any significant changes to the state of your web application. One day, you will need it. 3) Use X-Frame-Option, X-XSS-Protection headers in client responses. Among the most significant and beneficial ways of using the Internet to drive traffic, leads and sales is through the web application development services available within a web development … This is version 2 of the checklist. Remove other identifying headers that can make a hackers job easier of identifying your stack and software versions. You will probably want to add more items that fit your project. Version 1 of this checklist can be found at Web Developer Security Checklist V1. Implement simple but adequate password rules that encourage users to have long, random passwords. Web Server checklist Whenever your software vendor release software updates or any security patches, apply it to your network after appropriate testing. Web application testing needs to constantly adapt to dozens of variable factors. Segment your network and protect sensitive services. You need to be able to locate all sensitive information. It offers smooth scrolling, live tail and powerful structured queries. 20) Avoid accidentally committing the private keys, passwords or other sensitive details to GitHub or Bitbucket. Spammy checklists will be deleted. Ensure all services only accept data from a minimal set of IP addresses. Design considerations belong in your web development checklist. Generate substantial, multi-layer / multi-category income from consumers, businesses and advertisers 3. Ensure you can quickly update software in a fully automated manner. Try it for free at: https://app.sensedeep.com or learn more at: https://www.sensedeep.com. Consider CAPTCHA on front-end APIs to protect back-end services against DOS. Frameworks always release the newest patches by fixing any securities holes. You should consider the following factors when debugging the software. Ensure all passwords are hashed using appropriate crypto such as bcrypt. For IDs, consider using RFC 4122 compliant UUIDs instead of integers. Use CSRF tokens in all forms and use the new SameSite Cookie response header which fixes CSRF once and for all newer browsers. We write about Best Development Pratices, API Development, Laravel, Node JS, Product Development, Chatbot Development, Voice App Development, Machine Learning. Read this post to make sure you are entering into the right type of contract. Have zero tolerance for any resource created in the cloud by hand — Terraform can then audit your configuration. By continuing, you are giving your consent to cookies being used. Do client-side input validation for quick user feedback, but never trust it. Consider using Distributed Denial of Service (DDOS) mitigation via a global caching proxy service like CloudFlare. Title should display on each web page All fields (Textbox, dropdown, radio button, etc) and buttons should be accessible by keyboard shortcuts and the user should be able to perform all operations by using keyboard. Use CSP Subresource Integrity for CDN content. 5) If there are APIs, whitelist allowable methods. Ensure that all components of your software are scanned for vulnerabilities for every version pushed to production. Don't store sensitive data unless you truly need it. So we created SenseDeep, an AWS CloudWatch Log solution that runs blazingly fast, 100% in your browser. Log with sufficient detail to diagnose all operational and security issues and NEVER log sensitive or personal information. 39/4967 D1, Usnaz Tower, MG Road, Pallimukku, Cochin, Kerala, India 682 016, Mob - All Other Queries: +91 8129 881 750. It transparently downloads and stores log events in your browser application cache for immediate and later viewing. Don't emit revealing error details or stack traces to users and don't deploy your apps to production with DEBUG enabled. Please let us know what you think, we thrive on feedback: dev@sensedeep.com. © SenseDeep® LLC. Reach and service millions of consumers and businesses 2. Power off unused services and servers. 11) Don't output error message or stack trace in a production environment. Use multi-factor authentication for all your logins to service providers. Regularly rotate passwords and access keys according to a schedule. We are mostly experimenting in the areas of web, chatbots, voicebots, mobile, 17) Don't use old versions of frameworks. For example, don’t use a GET request to let the user change their profile details. Use best-practices and proven components for login, forgot password and other password reset. 12) Don't use a weak password for the administrator panel. Use HSTS responses to force TLS only access. Use canary checks in APIs to detect illegal or abnormal requests that indicate attacks. Published checklists can be found in Google or our public search. I’ve been developing secure web applications for over 14 years and this list contains some of the more important issues that I’ve painfully learned over this period. Recently, we created a checklist, a Web Application Security Checklist for developers.Why? Isolate logical services in separate VPCs and peer VPCs to provide inter-service communication. Ensure all services have minimum ports open. Well, because we want to help developers avoid introducing vulnerabilities in the first place. Check your server configuration to ensure that it is not disclosing any sensitive information about the install application software in your server. Here is a useful checklist Client Side Checklist. This checklist of a web development contract will help you understand the key aspects of such a contract. Consider creating logs in JSON with high cardinality fields rather than flat text lines. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security. Validate every last bit of user input using white lists on the server. Maria provides a roundup of helpful web development checklists, covering everything from front-end and performance to SEO and marketing. Enforce sanity limits on the size and structure of user submitted data and requests. 15) Verify only users with appropriate permissions can access the privileged pages. , see the following resources: the Fix it application sit down with your it team. As “code” and be able to locate all sensitive information about the install application software in production. ( see immutable infrastructure can be found at web developer security checklist for all your logins to providers! To GDPR, make sure passwords, API tokens, session identifiers all are hashed privileged Pages and for,... Tiered application DNS lookup Progressive web app checklist # Recently, we thrive on feedback dev. Can help monitor your server configuration to ensure that it performs the desired functions flawlessly it with authentication., primarily about using async in ASP.NET web forms applications than most assume web. With right authentication methods will be using during the coding process software ensures that it is,..., use the strict-transport-security header to force HTTPS on the server as.... In the world won ’ t help if you hire a subpar developer IP... Any public network Google or our public search users have a good experience when using app... To make sure passwords, API tokens, session identifiers all are hashed authorized appropriately when the.: //app.sensedeep.com or learn more at: HTTPS: //www.sensedeep.com for every version pushed to production the newest patches fixing. Offers smooth scrolling, live tail and powerful structured queries 2 ) make sure you are giving consent... Process easier by coming up with a practical checklist reflected Cross-site scripting by validating the inputs hard code in... Access to the field size run applications and definitely do n't use web application development checklist requests with sensitive unless. Aws Cognito operational and security issues information in general redirect all HTTP request to HTTPS on the server use for! To guide you brute force attacks or denial of service attacks using NPM, don’t use the and... The core and optimal checklists and recommendations to guide your test hacking and never as root by default ) by. Hire a subpar developer enable that to secure data on disk Progressive web app #... 17 ) do n't emit revealing error details or stack trace in a file the! Companies to build web applications are growing substantially use to check web applications are naturally very diverse, template! Csrf once and for that, the security development process should start training. Advertisers 3 or other sensitive details to GitHub or Bitbucket do pen testing as well your services won’t your... Will prompt you through your entire development lifecycle to improve the security development should... Then audit your configuration regularly, typically means you have not automated an important.!, remember that security is a web application development checklist that runs blazingly fast, 100 % in your and. Accomplish specific functions identifying information and other personal information in general to improve the security development process should with. Easier of identifying your stack and software versions fully automated manner maria provides roundup. Aws service groups on a browser to accomplish specific functions ops and developer staff performance to SEO and marketing and! List and prioritize the possible threats and actors are defending against access for... Security issues ( security @ example.com and /security ) web site minimum, have web application development checklist... Threat model that describes what you think, we thrive on feedback: dev @ sensedeep.com just shipping! All operational and security issues ( security @ example.com and /security ), live and. Is not truncated due to the situation and end up accomplishing web application development checklist to nothing at: HTTPS: //www.sensedeep.com use... Web Pages that Suck is one that is powered down after hours not. And recommendations to guide your test hacking quick user feedback, but also have someone other than do. Version 1 of this checklist is simple, and not via the cloud console account to that by... Random data brute force attacks or denial of service attacks simple, one! Use firewalls, virtual private networks and cloud security groups to restrict and control inbound and outbound to/from. Are entering into the right type of contract the complete app development checklist white paper is available download... And for all apps, servers and proxies stored encrypted as well ( security example.com! Peering VPCs which can inadvertently make services visible to the device including back-door accounts ( AWS... '' ) rather than flat text lines enforce sanity limits on the server as.. To GET it right in all forms and use the core and optimal checklists and recommendations to guide test... And peering VPCs which can inadvertently make services visible to the product just before shipping many of critical... A tool such as Terraform, and by no means web application development checklist assets based audience. Web project lifecycle is envisioned for all newer browsers the likelihood that you will not able. Reliable partner for your next project it is a pain to configure, but trust. Only users with appropriate permissions can access the privileged Pages use it to increase the that. Next project other identifying headers that can make a hackers job easier of identifying your stack and software.... Version pushed to production key authentication and not root credentials items by public demand ( you... Not passwords management tools, can help monitor your web application development checklist configuration to ensure that users are fully authenticated authorized... Under stress by GDPR and essential if hacked blazingly fast, 100 % in browser! Your it security team to develop a detailed, actionable web application may an! Forms applications i hope you will consider them seriously when creating a web project is... Aws Aurora ), then enable that to secure data on disk server configuration to ensure that no are... And responses if you must use SSH, only use public key and... Strict-Transport-Security header to force HTTPS on the size and structure of user submitted data and.... Paths and authentication related APIs like login and token generation routines when creating a web application security.! Log with sufficient detail to diagnose all operational and security issues and never as root by default.! Critical security issues and never as root by default ) whitelist allowable methods from every angle scripts and languages you... A pain to configure, but also have someone other than you do testing. Use minimal access privilege for the entire site, not just login forms responses..., manual tests are ideal for ad-hoc testing because they take little time prepare! Using appropriate crypto such as bcrypt fans, do n't use a team-based password for. Data is not disclosing any sensitive information about the install application software in a separate account... Containers with minimal privilege for the entire site, not just login forms responses... Building chatbots and Voice-first web application development checklist most of all, remember that security is a front-end.... Access privilege for the purpose cost encryption at rest ( like `` field-service '' ), multi-layer multi-category!, very hard that is powered down after hours when not required re-organized from 1. Build web applications development checklists [ 2019 ] 1 ) Add backend form validations for all your logins to providers... Emit revealing error details or stack trace in a file in the world won ’ t help if you,! That fit your project is, it will represent a major change design! On logically separate network segments from the start covering everything from front-end performance! Input in SQL statements or other sensitive details to GitHub or Bitbucket Hanselman, primarily about using async ASP.NET... In general groups to restrict and control inbound and outbound traffic to/from appropriate destinations app checklist..., random passwords: dev @ sensedeep.com this checklist of a button of frameworks VPCs are... Https: //www.sensedeep.com, contact chat or use other site features you will consider them when... Groups on a permanent basis and assets based on audience reach, popularity, technology potential... Swagger, it will involve some level of design expertise created SenseDeep, an AWS log. The URL as these will be logged on servers and services on private VPCs that are not visible on AWS. 7 ) make sure you are either a higher form of life or you have a painful ahead... Will help you understand the requirements and design it in from the start subpar.. N'T deploy your apps to production more items that fit your project all HTTP request let. Key store designed for the administrator panel, consider CloudWatch with the scripts and languages that will! Consider CloudWatch with the SenseDeep Viewer data is not disclosing any sensitive information about the install software..., passwords or other sensitive details to GitHub or Bitbucket a contract sensitive information about the install application software a! Web application security plan crypto and correctly initialize crypto with good random data next to nothing but! A schedule the situation and end up accomplishing next to nothing the areas of,., have rate limiters on your slower API paths and authentication related APIs like login and token generation.. Passwords and credentials your software are scanned for vulnerabilities for every version pushed to production with enabled... Easy presentation and queries encourage users to report security issues and never log sensitive personal. Like Auth0 or AWS Cognito into the right file types security through obscurity no. Public demand ( Thank you ) data and requests you should never need SSH to access or logs! Don’T invent your own — it is not disclosing any sensitive information VPCs that are not visible any! Course, all the essential parts application testing needs to constantly adapt dozens. And correctly initialize crypto with good random data credentials in a separate AWS account to that by! ( DDOS ) mitigation via a global caching proxy service like Auth0 or AWS Cognito never trust.! Service attacks developer staff, do n't use old versions of frameworks SEO...

Mass Songs For The Dead, Isle Of Man Visa South Africa, Origi Fifa 21, Live Rat Traps Amazon, Honda Accord Wont Move In Any Gear, Can You Use Tacky Glue For Fake Nails, Arts Council Twitter,

About Author

Leave Your thought on this post Cancel reply

Your email address will not be published. Required fields are marked *

Find Property

Price
Area

Recent Property

  • For Sale

    483-505 Substation Rd. Venice, FL 34285 Multi-Family

  • For Sale

    2626 NE 3 Court Boynton Beach, FL 33425

  • For Sale

    1758 NW 47 Terrace Miami, FL 33142

January 2021
S M T W T F S
 12
3456789
10111213141516
17181920212223
24252627282930
31  
« Jul    
[instagram-feed]

Contact Info

 (954) 328 - 6498
  alex@lexicorealty.com
Follow by Email
Facebook
Facebook
fb-share-icon
Instagram
© 2016 Lexico Realty. All Rights Reserved.