1. OWASP Foundation. (2021). OWASP Top 10:2021. A03:2021-Injection. In the "How to Prevent" section
the primary recommendation is to "Use a safe API
which avoids using the interpreter entirely or provides a parameterized interface
" followed by server-side input validation. This directly supports parameter validation as a key defense. Retrieved from https://owasp.org/Top10/A032021-Injection/
2. Zeldovich
N.
& Kaashoek
F. (2014). 6.858 Computer Systems Security
Fall 2014. MIT OpenCourseWare. Lecture 15: Web Security
Slides 20-23. The lecture explicitly identifies "Check user input" (input validation) and using "prepared statements" (a form of parameterization) as the primary defenses against SQL injection attacks.
3. Scarfone
K.
Souppaya
M.
& Cody
A. (2007). Guide to Secure Web Services (NIST Special Publication 800-95). National Institute of Standards and Technology. Section 5.3
"Input Validation
" states
"Input validation should be performed to ensure that all input is well-formed and trustworthy... This is a defense against many types of attacks
including... SQL injection." (p. 5-4). DOI: https://doi.org/10.6028/NIST.SP.800-95