<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cbarlow</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cbarlow"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Cbarlow"/>
		<updated>2026-05-19T15:15:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=22171</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=22171"/>
				<updated>2007-10-05T12:22:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Current Project Status: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
'''OWASP Organization Backing'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback - Need Leadership Backing.&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – '''Need Input.'''&lt;br /&gt;
* Define Security Assessment Types – '''Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – '''Stub Started - Need Input.'''&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels:'''&lt;br /&gt;
&lt;br /&gt;
''[ Suggest Establishment of Definitions and Context prior to commencement ]''&lt;br /&gt;
&lt;br /&gt;
* Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
* Create assessment levels based on previous Phase II and III objectives.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
* Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-appsec-standards subscription page.]&lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
* Imre Kertesz, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=10879</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=10879"/>
				<updated>2006-10-20T16:41:26Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – '''Stub Started - Need Input.'''&lt;br /&gt;
* Define Security Assessment Types – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels:'''&lt;br /&gt;
&lt;br /&gt;
''[ Suggest Establishment of Definitions and Context prior to commencement ]''&lt;br /&gt;
&lt;br /&gt;
* Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
* Create assessment levels based on previous Phase II and III objectives.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
* Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-appsec-standards subscription page.]&lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
* Imre Kertesz, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=10325</id>
		<title>Definition for Security Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=10325"/>
				<updated>2006-10-09T19:06:45Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
This article’s focus is to define, where practical, nomenclature and definitions of the differing security '''Assessment Techniques'''.  Agreement and establishment of these definitions are foundational to establishing the '''Assessment Levels''' later within this project.&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
&lt;br /&gt;
The following assessment techniques are proposed (in assessment depth order):&lt;br /&gt;
&lt;br /&gt;
* Application Security Threat Assessment&lt;br /&gt;
* Application Security Architecture Review&lt;br /&gt;
* Automated External Application Scanning (Tool Based)&lt;br /&gt;
* Automated Source Code Analysis (Tool-Based Static Code Analysis) &lt;br /&gt;
* Manual Penetration Testing (Security Test Specialist)&lt;br /&gt;
* Manual Security-Focused Code Review (Software Security Specialist)&lt;br /&gt;
&lt;br /&gt;
NOTE: these should probably link to full articles on each subject&lt;br /&gt;
&lt;br /&gt;
[Semi Agree.  Detail on each technique is needed to establish definitions baseline for assessment levels component of project (the guts).  OK with moving to full articles if can maintain one master article (need to build in this one) that demonstrates relationships between techniques, commonalities, and relative building of assessment depth from technique to technique]&lt;br /&gt;
&lt;br /&gt;
==Application Security Threat Assessment==&lt;br /&gt;
&lt;br /&gt;
Analyzes application architectural information to develop a threat profile for the application components.  &lt;br /&gt;
&lt;br /&gt;
* Identify the nature of the threats – the likely vulnerabilities of the given application and business.&lt;br /&gt;
&lt;br /&gt;
* Estimate the probability that those vulnerabilities might lead to a disruption and the type of impact – both expected and worst case – that might arise.&lt;br /&gt;
&lt;br /&gt;
* Analyze the different consequences and their likelihood of occurrence and determine which should be dealt with and what priority should be attached to mitigate.&lt;br /&gt;
&lt;br /&gt;
While the threats to each asset within the Application can be individually developed and mapped, a more efficient approach is to develop a master list of threat types and identify how these can be used to launch an attack on the Application and/or its components and potentially in turn the business itself.  A single threat may exploit a vulnerability to damage different types of assets. Conversely, several threat types may exploit disparate vulnerabilities in order to attack a single critical asset. Given the many-to-many relationships between threats and assets, it is best to use a simple representation of threat to asset mapping by listing threat types by each critical asset identified.&lt;br /&gt;
&lt;br /&gt;
A threat assessment should categorize threat types and threat agents but should focus on malicious threats and will not cover accidental and natural threats. The source of Malicious Threats (the attacker or perpetrator, in this context) can be classified as unauthorized and authorized. Threat vectors and operating environment more fully define how and why a particular “user” falls into one of these categories:&lt;br /&gt;
&lt;br /&gt;
Unauthorized: &lt;br /&gt;
* An attacker who does not have credentials to legitimately access the application&lt;br /&gt;
&lt;br /&gt;
Authorized:&lt;br /&gt;
* A legitimate user of the application&lt;br /&gt;
* A malicious insider&lt;br /&gt;
* A previously unauthorized user who has gained authorized access through compromise of a valid account or user session&lt;br /&gt;
&lt;br /&gt;
While the threat agents may have similar intent, varying reasons for engaging in illegal activities motivates them. Some authorized employees may willfully commit fraud for financial gain or engage in sabotage in order to disrupt routine operations. Theft, vandalism, intentional corruptions and alteration of information are also categorized as malicious threats.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* By using results from a threat assessment, the end-client is able to focus assessment (testing) activities based on business requirements and operational reality. &lt;br /&gt;
* Allows vulnerabilities discovered in other assessment types to be weighted and prioritized based on threat probability vs. raw vulnerability finding.&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee that all possible security threats will be uncovered. &lt;br /&gt;
* End-client must evaluate analysis and determine responses(s).&lt;br /&gt;
* Requires existence of application architecture documentation.&lt;br /&gt;
* Often confused with Risk Assessments, which weigh asset value, threat, and vulnerability in order to determine business risk.  Threat assessments focus on identifying only the threat component (vector(s) and probability).&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security resources (i.e.,  “bake in” security during application development begets higher return on investment vs. “bolting on” application security fixes post production).&lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Application Security Architecture Review==&lt;br /&gt;
&lt;br /&gt;
Typically a table-top design level review and analysis of the application to identify critical assets, sensitive data stores and business critical interconnections.  The purpose of architecture reviews is to also aid in determining potential attack vectors, which could be used in testing.  Thus many organizations will blend this activity with Threat Assessment.  The review of the application and its interconnections should include both a network- and application-level evaluation.  Evaluation should identify areas of potential and actual vulnerability from these levels. This includes areas of vulnerability in the network and application architecture, in addition to a high-level measure of risk of each of those areas.&lt;br /&gt;
 &lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* Provides more depth to the development rationale of various functionality in the application life cycle. &lt;br /&gt;
* By using results from Architecture Review, the assessment (testing) team is able to follow development logic in the “how” and “why” business and security requirements were integrated into application behavior and security controls/constraints. &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee identification of all possible security threats. &lt;br /&gt;
* Because the scope of an architectural assessment is far more complex than the limited perspective of an application layer assessment, recommendations are similarly complex, sometimes involving “political” changes (i.e., security department’s level of involvement in the SDLC). &lt;br /&gt;
* Requires on-site discussions with application principals.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security dollars (i.e.,  incorporate security in beginning begets higher return on investment vs. fixing applications post production). &lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Automated External Application Scanning==&lt;br /&gt;
&lt;br /&gt;
Utilizing automated open source or commercial software to discover known application layer vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Able to quickly identify default content, misconfigurations and error conditions resulting from improper input.&lt;br /&gt;
* Ability to be run on automated, regular basis to provide baseline and ongoing vulnerability management metrics.&lt;br /&gt;
* Can reduce the time required to assess large applications.&lt;br /&gt;
* Lower cost to operate/execute (excluding initial capital cost if using commercial testing software).&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Not designed to determine the extent to which the vulnerabilities can be exploited to compromise the data the application handles.&lt;br /&gt;
* Requires appropriate skills/knowledge to use, configure, and interpret results (despite “point and click” vendor marketing claims).  &lt;br /&gt;
* Requires extensive configuration and customization to emulate a user session.&lt;br /&gt;
* Limited ability to correlate events and correlate minor issues that may lead to larger exposure.  &lt;br /&gt;
* Inability to adapt to dynamic responses in business logic flows.&lt;br /&gt;
* Unable to find vulnerabilities that only become apparent after performing a sequence of steps (e.g., business logic flow bypass, session state compromise, etc.).&lt;br /&gt;
* Unable to figure out “how deep the rabbit hole goes” – No means to interpret security implications, express extent of potential compromise, or identify seriousness of business and information exposure.  &lt;br /&gt;
* Tools will often be confused by some aspect of an application's behavior, causing a particular class of test to generate a false positive.  Because most tools lack intelligence and cannot adapt to such conditions, test results include a large number of identical false positives.   &lt;br /&gt;
** For valid findings, the tools will often find dozens or hundreds of nearly identical findings, each with the same root cause.  &lt;br /&gt;
* Tool based findings are only indications of problems. Manual review (by someone well versed in web application testing) is usually necessary to draw the necessary parallels between different findings, and determine which findings identify unique problems, and which represent repetition.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Handling routine, manually intensive steps (e.g., input validation, field “fuzzing”, etc.) in an assessment is useful, particularly in large applications. However, scanner-based results can be used as the starting point from which expert testing can take over.&lt;br /&gt;
* Testing less critical applications (i.e., applications that do not contain/handle business sensitive data and/or are not critical to business operation) where the perceived lower risk does not warrant performing hands-on testing.&lt;br /&gt;
* Testing critical applications as a prelude to expert testing or code reviews.&lt;br /&gt;
&lt;br /&gt;
If a tool is used, it is important to define the technical limitations of the tool when the findings are presented.  An example of this may involve noting the potential for SQL injection attacks based upon verbose SQL error messages, but also the tool’s inability to produce the correct syntax needed to extract specific information from the vulnerable database.  A failure to convey the differences between automated and expert testing increases the risk that the application assessment results will be interpreted (particularly by management) as being more “secure” than they actually are. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Automated Source Code Analysis==&lt;br /&gt;
&lt;br /&gt;
Automated source code analysis involves the use of special software &amp;quot;tools&amp;quot; to conduct [http://en.wikipedia.org/wiki/Static_code_analysis Static Code Analysis] on software source code to identify potential vulnerabilities within the code. &lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* can be very effective method for identifying defects in code functionality and syntax errors&lt;br /&gt;
* most automated source code analysis tools are highly scalable&lt;br /&gt;
* expedites code review process (can review 400-500 LOC/hr via manual review vs. up to 10,000 LOC/hr using automated source code scanning tools)&lt;br /&gt;
* helps teams focus their manual code review activities on flagged, high-risk areas &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* most automated source code analysis tools generate false positives &lt;br /&gt;
* some automated source code analysis tools have a significant learning curve&lt;br /&gt;
* some coding languages (such as ASP) are not supported by the tools&lt;br /&gt;
* results of automated scans are basically &amp;quot;blueprints&amp;quot; of source code vulnerabilities, so they must be properly protected&lt;br /&gt;
* Most of the automated source code analysis tools available on the market today can not identify logic errors, timing errors, resource conflicts, data errors and configuration errors.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Automated source code analysis tools can be used to enhance and improve an organization’s overall efforts to find and eliminate security vulnerabilities within software applications. However, they should not be viewed as a &amp;quot;silver bullet&amp;quot;. Manual code reviews must still be conducted to identify false positives and security-related defects that tools can not identify.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Manual Penetration Testing==&lt;br /&gt;
&lt;br /&gt;
Manual Penetration Testing involves application analysis performed by an experienced analyst, usually using a combination of open source automated utilities (either self created or through security community) for performing task-specific functions and hands-on analysis to attempt to further ‘hack’ the application as an attacker.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Open source tools utilized by the expert tester are developed usually for specific purposes rather than wrapping multiple functionality into a GUI. Typically are one of many components in the testers toolkit.&lt;br /&gt;
* “Expert testing” is an intuitive approach (Business logic analysis), with the ability to identify flaws in business logic that automated scanners are usually incapable of finding.&lt;br /&gt;
* Addresses many of the disadvantages noted in Automated Testing.&lt;br /&gt;
* Ability to correlate events and minor issues that may lead to larger exposure.  This is a critical advantage of hands-on testing and simulates how a real attacker would operate. &lt;br /&gt;
* Ability to communicate complex technical findings in a manner that all can understand.  The job is not done until the assessment end-client understands the nature of the vulnerability discovered and its security implications.  &lt;br /&gt;
** The analysis phase of expert testing provides “root cause” identification and recommendations based upon the unique, developmental characteristics of an application. Results from an automated tool cannot provide customized, specific recommendations tailored for each application and the end-client’s requirements.  &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Often confused with Automated Testing – Marketing of commercial tools uses terms such as “expert” and “intuitive”, normally associated with an assessment performed by an experienced analyst.&lt;br /&gt;
* Inability of most end-client organizations to determine if tester has appropriate application security skills required.  There are no community accepted credentials/certifications established for this area of security.&lt;br /&gt;
* Cost to conduct will be higher though there is no upfront capital cost.&lt;br /&gt;
* Without establishing clear metrics up front, ongoing testing to determine trends within business environment or iterations of application is difficult.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Testing critical applications (i.e., applications that do contain/handle business sensitive data and/or are critical to business operation) where the perceived higher risk does not warrant performing automated testing.&lt;br /&gt;
* Best suited for B2B, B2C and/or any transactional based and/or multi-level access application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Manual Security-Focused Code Review==&lt;br /&gt;
&lt;br /&gt;
Review of the software source code to identify source code-level issues, which may enable an attacker to compromise an application, system, or business functionality. Web applications in particular are likely to have these vulnerabilities, as they are frequently developed quickly in an environment that does not allow for much security planning and testing. This should not be viewed as simply a generic software audit.  Security-focused code reviews should be specifically tailored to find common vulnerabilities in applications. &lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* If integrated into the [http://en.wikipedia.org/wiki/Software_development_life_cycle Software Development Life Cycle (SDLC)], coding issues can be resolved earlier in the development process. (which is much less expensive to fix than a post-production revision of the code).&lt;br /&gt;
* Provides the ability to identify and address serious coding issues (e.g., input validation, hard-coded credentials, debugging features, etc.) prior to production.&lt;br /&gt;
* Enables development teams to identify and correct insecure coding techniques that could lead to security vulnerabilities or possible incidents.&lt;br /&gt;
* Helps developers learn from each other and share knowledge on secure coding techniques, best practices and common solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* can be very time consuming and costly if automated tools are not available to help augment the review process&lt;br /&gt;
* If conducted solely by tools, results will be mostly static signature matching though some tools claim to walk codepath (follow nested loops and other regression through objects).&lt;br /&gt;
* Even applications that exhibit strong and thorough software development practices (e.g., documentation, seamless modularity, string checking to prevent buffer overflows, etc.) can fall victim to attack if the underlying business logic doesn’t follow security requirements.&lt;br /&gt;
* Requires specific programming expertise (e.g., Java, .NET, PHP, etc.) that many application testers do not have.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Security-focused code reviews should be conducted as part of the normal SDLC. Reviews may also be needed during or after security testing, prior to implementing system upgrades, prior to making system configuration changes, when new security bulletins are released, or immediately following any reported security incidents.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References/Sources==&lt;br /&gt;
&lt;br /&gt;
* Testing Taxonomy &amp;amp; Testing Tools Classification : http://www.owasp.org/index.php/Image:AppSec2005DC-Arian_Evans_Tools-Taxonomy.ppt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9994</id>
		<title>Metrics Survey Form</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9994"/>
				<updated>2006-09-27T16:12:04Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Please use attached to participate in Application Security Metrics Survey&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/3/30/Survey_form_draft0925061.doc&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Metrics Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9993</id>
		<title>Metrics Survey Form</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9993"/>
				<updated>2006-09-27T16:11:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Please use attached to participate in Application Security Metrics Survey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Metrics Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9992</id>
		<title>Metrics Survey Form</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Metrics_Survey_Form&amp;diff=9992"/>
				<updated>2006-09-27T16:09:50Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Please use attached to participate in Application Security Metrics Survey&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Survey_form_draft0925061.doc&amp;diff=9991</id>
		<title>File:Survey form draft0925061.doc</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Survey_form_draft0925061.doc&amp;diff=9991"/>
				<updated>2006-09-27T16:06:11Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9681</id>
		<title>Definition for Security Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9681"/>
				<updated>2006-09-14T16:37:38Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This project article’s focus is to define, where practical, nomenclature and definitions of the differing security assessment types.  Agreement and establishment of these definitions are foundational to establishing the Assessment Levels later within this project. The following assessment types are proposed:&lt;br /&gt;
&lt;br /&gt;
* Application Threat Assessment&lt;br /&gt;
* Application Architecture Review&lt;br /&gt;
* Automated Testing (Application Scanning (Tool Based)) &lt;br /&gt;
* Expert Testing (Hands On Based) &lt;br /&gt;
* Application Code Review &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Application Assessment Types - Defined: ==&lt;br /&gt;
&lt;br /&gt;
'''Application Threat Assessment''' – Analyzes application architectural information to develop a threat profile for the application components.  Threat assessments:&lt;br /&gt;
&lt;br /&gt;
* Identify the nature of the threats – the likely vulnerabilities of the given application and business.&lt;br /&gt;
&lt;br /&gt;
* Estimate the probability that those vulnerabilities might lead to a disruption and the type of impact – both expected and worst case – that might arise.&lt;br /&gt;
&lt;br /&gt;
* Analyze the different consequences and their likelihood of occurrence and determine which should be dealt with and what priority should be attached to mitigate.&lt;br /&gt;
&lt;br /&gt;
While the threats to each asset within the Application can be individually developed and mapped, a more efficient approach is to develop a master list of threat types and identify how these can be used to launch an attack on the Application and/or its components and potentially in turn the business itself.  A single threat may exploit a vulnerability to damage different types of assets. Conversely, several threat types may exploit disparate vulnerabilities in order to attack a single critical asset. Given the many-to-many relationships between threats and assets, it is best to use a simple representation of threat to asset mapping by listing threat types by each critical asset identified.&lt;br /&gt;
&lt;br /&gt;
A threat assessment should categorize threat types and threat agents but should focus on malicious threats and will not cover accidental and natural threats. The source of Malicious Threats (the attacker or perpetrator, in this context) can be classified as unauthorized and authorized. Threat vectors and operating environment more fully define how and why a particular “user” falls into one of these categories:&lt;br /&gt;
&lt;br /&gt;
Unauthorized: &lt;br /&gt;
* An attacker who does not have credentials to legitimately access the application&lt;br /&gt;
&lt;br /&gt;
Authorized:&lt;br /&gt;
* A legitimate user of the application&lt;br /&gt;
* A malicious insider&lt;br /&gt;
* A previously unauthorized user who has gained authorized access through compromise of a valid account or user session&lt;br /&gt;
&lt;br /&gt;
While the threat agents may have similar intent, varying reasons for engaging in illegal activities motivates them. Some authorized employees may willfully commit fraud for financial gain or engage in sabotage in order to disrupt routine operations. Theft, vandalism, intentional corruptions and alteration of information are also categorized as malicious threats.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* By using results from a threat assessment, the end-client is able to focus assessment (testing) activities based on business requirements and operational reality. &lt;br /&gt;
* Allows vulnerabilities discovered in other assessment types to be weighted and prioritized based on threat probability vs. raw vulnerability finding.&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee that all possible security threats will be uncovered. &lt;br /&gt;
* End-client must evaluate analysis and determine responses(s).&lt;br /&gt;
* Requires existence of application architecture documentation.&lt;br /&gt;
* Often confused with Risk Assessments, which weigh asset value, threat, and vulnerability in order to determine business risk.  Threat assessments focus on identifying only the threat component (vector(s) and probability).&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security resources (i.e.,  “bake in” security during application development begets higher return on investment vs. “bolting on” application security fixes post production).&lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Application Architecture Review''' – Typically a table-top design level review and analysis of the application to identify critical assets, sensitive data stores and business critical interconnections.  The purpose of architecture reviews is to also aid in determining potential attack vectors, which could be used in testing.  Thus many organizations will blend this activity with Threat Assessment.  The review of the application and its interconnections should include both a network- and application-level evaluation.  Evaluation should identify areas of potential and actual vulnerability from these levels. This includes areas of vulnerability in the network and application architecture, in addition to a high-level measure of risk of each of those areas.&lt;br /&gt;
 &lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* Provides more depth to the development rationale of various functionality in the application life cycle. &lt;br /&gt;
* By using results from Architecture Review, the assessment (testing) team is able to follow development logic in the “how” and “why” business and security requirements were integrated into application behavior and security controls/constraints. &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee identification of all possible security threats. &lt;br /&gt;
* Because the scope of an architectural assessment is far more complex than the limited perspective of an application layer assessment, recommendations are similarly complex, sometimes involving “political” changes (i.e., security department’s level of involvement in the SDLC). &lt;br /&gt;
* Requires on-site discussions with application principals.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security dollars (i.e.,  incorporate security in beginning begets higher return on investment vs. fixing applications post production). &lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Automated Testing (Application Scanning (Tool Based))''' – Utilizing automated open source or commercial software to discover known application layer vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Able to quickly identify default content, misconfigurations and error conditions resulting from improper input.&lt;br /&gt;
* Ability to be run on automated, regular basis to provide baseline and ongoing vulnerability management metrics.&lt;br /&gt;
* Can reduce the time required to assess large applications.&lt;br /&gt;
* Lower cost to operate/execute (excluding initial capital cost if using commercial testing software).&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Not designed to determine the extent to which the vulnerabilities can be exploited to compromise the data the application handles.&lt;br /&gt;
* Requires appropriate skills/knowledge to use, configure, and interpret results (despite “point and click” vendor marketing claims).  &lt;br /&gt;
* Requires extensive configuration and customization to emulate a user session.&lt;br /&gt;
* Limited ability to correlate events and correlate minor issues that may lead to larger exposure.  &lt;br /&gt;
* Inability to adapt to dynamic responses in business logic flows.&lt;br /&gt;
* Unable to find vulnerabilities that only become apparent after performing a sequence of steps (e.g., business logic flow bypass, session state compromise, etc.).&lt;br /&gt;
* Unable to figure out “how deep the rabbit hole goes” – No means to interpret security implications, express extent of potential compromise, or identify seriousness of business and information exposure.  &lt;br /&gt;
* Tools will often be confused by some aspect of an application's behavior, causing a particular class of test to generate a false positive.  Because most tools lack intelligence and cannot adapt to such conditions, test results include a large number of identical false positives.   &lt;br /&gt;
** For valid findings, the tools will often find dozens or hundreds of nearly identical findings, each with the same root cause.  &lt;br /&gt;
* Tool based findings are only indications of problems. Manual review (by someone well versed in web application testing) is usually necessary to draw the necessary parallels between different findings, and determine which findings identify unique problems, and which represent repetition.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Handling routine, manually intensive steps (e.g., input validation, field “fuzzing”, etc.) in an assessment is useful, particularly in large applications. However, scanner-based results can be used as the starting point from which expert testing can take over.&lt;br /&gt;
* Testing less critical applications (i.e., applications that do not contain/handle business sensitive data and/or are not critical to business operation) where the perceived lower risk does not warrant performing hands-on testing.&lt;br /&gt;
* Testing critical applications as a prelude to expert testing or code reviews.&lt;br /&gt;
&lt;br /&gt;
If a tool is used, it is important to define the technical limitations of the tool when the findings are presented.  An example of this may involve noting the potential for SQL injection attacks based upon verbose SQL error messages, but also the tool’s inability to produce the correct syntax needed to extract specific information from the vulnerable database.  A failure to convey the differences between automated and expert testing increases the risk that the application assessment results will be interpreted (particularly by management) as being more “secure” than they actually are. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expert Testing (Hands On Based)''' – “Expert Testing” involves application analysis performed by an experienced analyst, usually using a combination of open source automated utilities (either self created or through security community) for performing task-specific functions and hands-on analysis to attempt to further ‘hack’ the application as an attacker.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Open source tools utilized by the expert tester are developed usually for specific purposes rather than wrapping multiple functionality into a GUI. Typically are one of many components in the testers toolkit.&lt;br /&gt;
* “Expert testing” is an intuitive approach (Business logic analysis), with the ability to identify flaws in business logic that automated scanners are usually incapable of finding.&lt;br /&gt;
* Addresses many of the disadvantages noted in Automated Testing.&lt;br /&gt;
* Ability to correlate events and minor issues that may lead to larger exposure.  This is a critical advantage of hands-on testing and simulates how a real attacker would operate. &lt;br /&gt;
* Ability to communicate complex technical findings in a manner that all can understand.  The job is not done until the assessment end-client understands the nature of the vulnerability discovered and its security implications.  &lt;br /&gt;
** The analysis phase of expert testing provides “root cause” identification and recommendations based upon the unique, developmental characteristics of an application. Results from an automated tool cannot provide customized, specific recommendations tailored for each application and the end-client’s requirements.  &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Often confused with Automated Testing – Marketing of commercial tools uses terms such as “expert” and “intuitive”, normally associated with an assessment performed by an experienced analyst.&lt;br /&gt;
* Inability of most end-client organizations to determine if tester has appropriate application security skills required.  There are no community accepted credentials/certifications established for this area of security.&lt;br /&gt;
* Cost to conduct will be higher though there is no upfront capital cost.&lt;br /&gt;
* Without establishing clear metrics up front, ongoing testing to determine trends within business environment or iterations of application is difficult.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Testing critical applications (i.e., applications that do contain/handle business sensitive data and/or are critical to business operation) where the perceived higher risk does not warrant performing automated testing.&lt;br /&gt;
* Best suited for B2B, B2C and/or any transactional based and/or multi-level access application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Application Code Review''' – Reviews the underlying foundational level to identify coding issues, which may create/enable an attacker to compromise an applications systems and/or business functionality. Web applications in particular are likely to have these vulnerabilities, as they are frequently developed quickly in an environment that does not allow for much security planning and testing. This should not be viewed as simply a generic software audit.  Code reviews should be specifically tailored to find vulnerabilities common in applications. &lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* If integrated into application SDLC, coding issues can be resolved early in the development and functional testing process. (which is much less expensive to fix than a post-production revision of the code).&lt;br /&gt;
* Provides the ability to identify and address serious coding issues (e.g., input validation, hard-coded credentials, debugging features, etc.) prior to production.&lt;br /&gt;
* …&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* …&lt;br /&gt;
* If conducted solely by tools, results will be mostly static signature matching though some tools claim to walk codepath (follow nested loops and other regression through objects).&lt;br /&gt;
* Even applications that exhibit strong and thorough software development practices (e.g., documentation, seamless modularity, string checking to prevent buffer overflows, etc.) can fall victim to attack if the underlying business logic doesn’t follow security requirements.&lt;br /&gt;
* Requires specific programming expertise (e.g., Java, .NET, PHP, etc.) that many application testers do not have.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* …&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References/Sources:&lt;br /&gt;
&lt;br /&gt;
* Testing Taxonomy &amp;amp;�Testing Tools Classification : http://www.owasp.org/index.php/Image:AppSec2005DC-Arian_Evans_Tools-Taxonomy.ppt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9667</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9667"/>
				<updated>2006-09-13T17:45:00Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Current Project Status: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – '''Stub Started - Need Input.'''&lt;br /&gt;
* Define Security Assessment Types – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels:'''&lt;br /&gt;
&lt;br /&gt;
''[ Suggest Establishment of Definitions and Context prior to commencement ]''&lt;br /&gt;
&lt;br /&gt;
* Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
* Create assessment levels based on previous Phase II and III objectives.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
* Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
* Imre Kertesz, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9666</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9666"/>
				<updated>2006-09-13T17:32:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Current Project Status: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – '''Stub Started - Need Input.'''&lt;br /&gt;
* Define Security Assessment Types – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – '''Stub Started - Need Input.'''&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
* Imre Kertesz, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baseline_Assessor_Qual_and_Eval_Criteria&amp;diff=9665</id>
		<title>Baseline Assessor Qual and Eval Criteria</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baseline_Assessor_Qual_and_Eval_Criteria&amp;diff=9665"/>
				<updated>2006-09-13T17:30:54Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This project article’s focus is to establish common set of assessor qualifications and evaluation criteria to facilitate end service user ability to determine competence per assessment type.  Agreement and establishment of these qualifications and criteria are foundational to establishing the Assessment Levels later within this project.&lt;br /&gt;
&lt;br /&gt;
== Baseline Assessor Qualifications for Expert Testing ==&lt;br /&gt;
&lt;br /&gt;
Prior to hiring a firm or before hiring internally, verify and ensure on individual basis each Assessor has the following skills:&lt;br /&gt;
* 4+ years of technical security experience with multiple computer platforms, operating systems, software products, network protocols and system architecture.  &lt;br /&gt;
* Knowledge of security architecture methodologies, industry best practices and generally accepted information security principles. &lt;br /&gt;
* Demonstrated ability to secure (lock-down/harden) underlying operating systems and web services such as IIS or Apache – Thus inverse ability to break into insecure systems.&lt;br /&gt;
* Demonstrated experience in designing and integrating security services (authentication, authorization, encryption, integrity, and non-repudiation) into systems and/or applications. &lt;br /&gt;
** Demonstrated ability to recognize MD5 from Base64 from an encrypted value visually.  (Example to demonstrate depth of knowledge in encryption)&lt;br /&gt;
* Demonstrated experience in conducting vulnerability assessments and penetration testing – Seen as foundational skills to application level testing.&lt;br /&gt;
** Demonstrated evidence of vulnerability discoveries (new undiscovered vulnerability).&lt;br /&gt;
** Demonstrated ability to interpret a generated report from vulnerability scanners and quickly recognize potential false positives.&lt;br /&gt;
** Able to demonstrate any exploit used during a test if requested by a client.&lt;br /&gt;
* Solid understanding and experience in Web application and Internet security.&lt;br /&gt;
* Solid, in-depth understanding of all Internet and Web protocols.&lt;br /&gt;
* Full understanding of major HTML directives and code.&lt;br /&gt;
* Knowledge of Service Oriented Architectures (SOA) and SOAP if applicable to environment.&lt;br /&gt;
* Demonstrated ability to reverse engineer a transactional web application.&lt;br /&gt;
* Produces own security tools known in reputable security circles.  Ability to shell code to automate custom tests.&lt;br /&gt;
* Demonstrated use of testing methodologies defined in OWASP Testing Project – Ask for specific testing process used for three or more testing areas.&lt;br /&gt;
* Demonstrated ability to create and follow a project specific well documented test plan.&lt;br /&gt;
* Programming / web services development experience a benefit.  However, not all programmers make good security testers (it’s a mindset thing).&lt;br /&gt;
* Demonstrated ability to formulate written technical material in a clear and effective manner – Ask for writing sample.&lt;br /&gt;
&lt;br /&gt;
Assessors identify and exploit security weaknesses, evaluate counter-measures and conduct analysis to determine potential security impacts to business.  More so, the assessor must demonstrate ability to take assessment data and formulate security technical solutions.  &lt;br /&gt;
&lt;br /&gt;
The following education and/or certifications are helpful and increase the viability of the Assessor (establishes their business foundation skills thus ability to link technical results to business impact) but should not be taken as sole means for evaluating.&lt;br /&gt;
* Undergraduate degree in Computer Science, Information Systems, Engineering, or related discipline&lt;br /&gt;
* CISSP or CCNA or GIAC certifications &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Evaluation Criteria'''&lt;br /&gt;
&lt;br /&gt;
The following matrix is intended to summarize the skills required per assessment level. &lt;br /&gt;
&lt;br /&gt;
''…[To Be Developed After Assessment Levels Established]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9664</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9664"/>
				<updated>2006-09-13T17:26:03Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Project Contributers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – Stub Started.&lt;br /&gt;
* Define Security Assessment Types – Stub Started.&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – Need Stub&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
* Imre Kertesz, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9663</id>
		<title>Definition for Security Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9663"/>
				<updated>2006-09-13T17:24:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This project article’s focus is to define, where practical, nomenclature and definitions of the differing security assessment types.  Agreement and establishment of these definitions are foundational to establishing the Assessment Levels later within this project.&lt;br /&gt;
&lt;br /&gt;
== Application Assessment Types - Defined: ==&lt;br /&gt;
&lt;br /&gt;
'''Application Threat Assessment''' – Analyzes application architectural information to develop a threat profile for the application components.  Threat assessments:&lt;br /&gt;
&lt;br /&gt;
* Identify the nature of the threats – the likely vulnerabilities of the given application and business.&lt;br /&gt;
&lt;br /&gt;
* Estimate the probability that those vulnerabilities might lead to a disruption and the type of impact – both expected and worst case – that might arise.&lt;br /&gt;
&lt;br /&gt;
* Analyze the different consequences and their likelihood of occurrence and determine which should be dealt with and what priority should be attached to mitigate.&lt;br /&gt;
&lt;br /&gt;
While the threats for each asset within the Application can be individually developed and mapped, a more efficient approach is to develop a master list of threat types and identify how these can be used to launch an attack on the Application and/or its components and potentially in turn the business itself.  A single threat may exploit a vulnerability to damage different types of assets. Conversely, several threat types may exploit disparate vulnerabilities in order to attack a single critical asset. Given the many-to-many relationships between threats and assets, it is best to use a simple representation of threat to asset mapping by listing threat types by each critical asset identified.&lt;br /&gt;
&lt;br /&gt;
A threat assessment should categorize threat types and threat agents but should focus on malicious threats and will not cover accidental and natural threats. The source of Malicious Threats (the attacker or perpetrator, in this context) can be classified as unauthorized and authorized. Threat vectors and operating environment more fully define how and why a particular “user” falls into one of these categories:&lt;br /&gt;
&lt;br /&gt;
Unauthorized: &lt;br /&gt;
* An attacker who does not have credentials to legitimately access the application&lt;br /&gt;
&lt;br /&gt;
Authorized:&lt;br /&gt;
* A legitimate user of the application&lt;br /&gt;
* A malicious insider&lt;br /&gt;
* A previously unauthorized user who has gained authorized access through compromise of a valid account or user session&lt;br /&gt;
&lt;br /&gt;
While the threat agents may have the similar intent, varying reasons for engaging in illegal activities motivates them. Some authorized employees may willfully commit fraud for financial gain or engage in sabotage in order to disrupt routine operations. Theft, vandalism, intentional corruptions and alteration of information are also categorized as malicious threats.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* By using results from Threat Assessment, the end-client is able to focus assessment (testing) activities based on business requirements and operational reality. &lt;br /&gt;
* Allows vulnerabilities discovered in other assessment types to be weighted and prioritized based on threat probability vs. raw vulnerability finding.&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee that all possible security threats will be uncovered. &lt;br /&gt;
* End-client must evaluate analysis and determine action(s).&lt;br /&gt;
* Requires existence of application architecture documentation.&lt;br /&gt;
* Often confused with Risk Assessments, which weigh asset value, threat, and vulnerability in order to determine business risk.  Threat assessments focus on identifying only the threat component (vector(s) and probability).&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security dollars (i.e.,  “bake in” security during application development begets higher return on investment vs. “bolting on” application security fixes post production).&lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Application Architecture Review''' – Typically a table-top design level review and analysis of the application to identify critical assets, sensitive data stores and business critical interconnections.  The purpose of architecture reviews is to also aid in determining potential attack vectors, which could be used in testing.  Thus the reason many organizations will blend this activity with Threat Assessment.  The review of the application and their interconnections should include both a network- and application-level evaluation.  Evaluation should identify areas of potential and actual vulnerability from these levels. This includes areas of vulnerability in the network and application architecture, in addition to a high-level measure of risk of each of those areas.&lt;br /&gt;
 &lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Aids in focusing testing activities and defining true targets in large scale enterprise level applications.&lt;br /&gt;
* Provides more depth to the development rationale of various functionality in the application life cycle. &lt;br /&gt;
* By using results from Architecture Review, the assessment (testing) team is able to follow development logic in the “how” and “why” business and security requirements were integrated into application behavior and security controls/constraints. &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Cannot guarantee identification of all possible security threats. &lt;br /&gt;
* Because the scope of an architectural assessment is far more complex than the limited perspective of an application layer assessment, recommendations are similarly complex, sometimes involving “political” changes (i.e., security department’s level of involvement in the SDLC). &lt;br /&gt;
* Requires on-site discussions with application principals.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Best as a precursor to development activities allowing best use of security dollars (i.e.,  incorporate security in beginning begets higher return on investment vs. fixing applications post production). &lt;br /&gt;
* Best utilized to determine the need and extent for further assessment (testing) activities (e.g., automated testing, expert testing, code review, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Automated Testing (Application Scanning (Tool Based))''' – Utilizing automated open source or commercial software to discover known application layer vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Able to quickly identify default content, misconfigurations and error conditions resulting from improper input.&lt;br /&gt;
* Ability to be run on automated, regular basis to provide baseline and ongoing vulnerability management metrics.&lt;br /&gt;
* Can reduce the time required to assess large applications.&lt;br /&gt;
* Lower cost to operate/execute (excluding initial capital cost if using commercial testing software).&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Not designed to determine the extent to which the vulnerabilities can be exploited to compromise the data the application handles.&lt;br /&gt;
* Requires appropriate skills/knowledge to use, configure, and interpret results (despite “point and click” vendor marketing claims).  &lt;br /&gt;
* Requires extensive configuration and customization to emulate a user session.&lt;br /&gt;
* Limited ability to correlate events and correlate minor issues that may lead to larger exposure.  &lt;br /&gt;
* Inability to adapt to dynamic responses in business logic flows.&lt;br /&gt;
* Unable to find vulnerabilities that only become apparent after performing a sequence of steps (e.g., business logic flow bypass, session state compromise, etc.).&lt;br /&gt;
* Unable to figure out “how deep the rabbit hole goes” – No means to interpret security implications, express extent of potential compromise, or identify seriousness of business and information exposure.  &lt;br /&gt;
* Tools will often be confused by some aspect of an application's behavior, causing a particular class of test to generate a false positive.  Because most tools lack intelligence and cannot adapt to such conditions, test results include a large number of identical false positives.   &lt;br /&gt;
** For valid findings, the tools will often find dozens or hundreds of nearly identical findings, each with the same root cause.  &lt;br /&gt;
* Tool based findings are only indications of problems. Manual review (by someone well versed in web application testing) is usually necessary to draw the necessary parallels between different findings, and determine which findings identify unique problems, and which represent repetition.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Handling routine, manually intensive steps (e.g., input validation, field “fuzzing”, etc.) in an assessment is useful, particularly in large applications. However, scanner-based results can be used as the starting point from which expert testing can take over.&lt;br /&gt;
* Testing less critical applications (i.e., applications that do not contain/handle business sensitive data and/or are not critical to business operation) where the perceived lower risk does not warrant performing hands-on testing.&lt;br /&gt;
&lt;br /&gt;
If a tool is used, it is important to define the technical limitations of the tool when the findings are presented.  An example of this may involve noting the potential for SQL injection attacks based upon verbose SQL error messages, but also the tool’s inability to produce the correct syntax needed to extract specific information from the vulnerable database.  A failure to convey the differences between automated and expert testing increases the risk that the application assessment results will be interpreted as being more “secure” than they actually are. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expert Testing (Hands On Based)''' – “Expert Testing” involves application analysis performed by an experienced analyst, usually using a combination of open source automated utilities (either self created or through security community) for performing task-specific functions and hands-on analysis to attempt to further ‘hack’ the application as an attacker.&lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* Open source tools utilized by the expert tester are developed usually for specific purposes rather than wrapping multiple functionality into a GUI. Typically are one of many components in the testers toolkit.&lt;br /&gt;
* “Expert testing” is an intuitive approach (Business logic analysis), with the ability to identify flaws in business logic that automated scanners are usually incapable of finding.&lt;br /&gt;
* Addresses many of the disadvantages noted in Automated Testing.&lt;br /&gt;
* Ability to correlate events and minor issues that may lead to larger exposure.  This is a critical advantage of hands-on testing and simulates how a real attacker would operate. &lt;br /&gt;
* Ability to communicate complex technical findings in a manner that all can understand.  The job is not done until the assessment end-client understands the nature of the vulnerability discovered and its security implications.  &lt;br /&gt;
** The analysis phase of expert testing provides “root cause” identification and recommendations based upon the unique, developmental characteristics of an application. Results from an automated tool cannot provide customized, specific recommendations tailored for each application and the end-client’s requirements.  &lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* Often confused with Automated Testing – Marketing of commercial tools uses terms such as “expert” and “intuitive”, normally associated with an assessment performed by an experienced analyst.&lt;br /&gt;
* Inability of most end-client organizations to determine if tester has appropriate application security skills required.  There are no community accepted credentials/certifications established for this area of security.&lt;br /&gt;
* Cost to conduct will be higher though there is no upfront capital cost.&lt;br /&gt;
* Without establishing clear metrics up front, ongoing testing to determine trends within business environment or iterations of application is difficult.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* Testing critical applications (i.e., applications that do contain/handle business sensitive data and/or are critical to business operation) where the perceived higher risk does not warrant performing automated testing.&lt;br /&gt;
* Best suited for B2B, B2C and/or any transactional based and/or multi-level access application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Application Code Review''' – Reviews the underlying foundational level to identify coding issues, which may create/enable an attacker to compromise an applications systems and/or business functionality. Web applications in particular are likely to have these vulnerabilities, as they are frequently developed quickly in an environment that does not allow for much security planning and testing. This should not be viewed as simply a generic software audit.  Code reviews should be specifically tailored to find vulnerabilities common in applications. &lt;br /&gt;
&lt;br /&gt;
''Advantages:''&lt;br /&gt;
* If integrated into application SDLC, coding issues can be resolved early in the development and functional testing process. (which is much less expensive to fix than a post-production revision of the code).&lt;br /&gt;
* Provides the ability to identify and address serious coding issues (e.g., input validation, hard-coded credentials, debugging features, etc.) prior to production.&lt;br /&gt;
* …&lt;br /&gt;
&lt;br /&gt;
''Disadvantages:''&lt;br /&gt;
* …&lt;br /&gt;
* If conducted solely by tools, results will be mostly static signature matching though some tools claim to walk codepath (follow nested loops and other regression through objects).&lt;br /&gt;
* Even applications that exhibit strong and thorough software development practices (e.g., documentation, seamless modularity, string checking to prevent buffer overflows, etc.) can fall victim to attack if the underlying business logic doesn’t follow security requirements.&lt;br /&gt;
* Requires specific programming expertise (e.g., Java, .NET, PHP, etc.) that many application testers do not have.&lt;br /&gt;
&lt;br /&gt;
Recommended use:&lt;br /&gt;
* …&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References/Sources:&lt;br /&gt;
&lt;br /&gt;
* Testing Taxonomy &amp;amp;�Testing Tools Classification : http://www.owasp.org/index.php/Image:AppSec2005DC-Arian_Evans_Tools-Taxonomy.ppt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9192</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9192"/>
				<updated>2006-08-22T14:51:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Current Project Status: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – Stub Started.&lt;br /&gt;
* Define Security Assessment Types – Stub Started.&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – Need Stub&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9191</id>
		<title>Definition for Security Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9191"/>
				<updated>2006-08-22T14:50:51Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This articles focus is to define, where practical, nomenclature and definitions of the differing security assessment types.&lt;br /&gt;
&lt;br /&gt;
== Assessment Type Categories - Defined: ==&lt;br /&gt;
&lt;br /&gt;
'''Application Scanning (Tool Based)''' – (Definition)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hands On Based Application Testing''' – (Definition)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Application Code Review''' – (Definition)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''?''' – (Definition)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9190</id>
		<title>Definition for Security Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_Security_Assessment_Techniques&amp;diff=9190"/>
				<updated>2006-08-22T14:49:28Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This articles focus is to define, where practical, nomenclature and definitions of the differing security assessment types.&lt;br /&gt;
&lt;br /&gt;
== Assessment Type Categories - Defined: ==&lt;br /&gt;
&lt;br /&gt;
'''Application Scanning (Tool Based)''' – &lt;br /&gt;
&lt;br /&gt;
'''Hands On Based Application Testing''' – &lt;br /&gt;
&lt;br /&gt;
'''Application Code Review''' – &lt;br /&gt;
&lt;br /&gt;
'''?''' – &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9189</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=9189"/>
				<updated>2006-08-22T14:41:22Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Current Project Status: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach:'''&lt;br /&gt;
&lt;br /&gt;
* Minimal feedback obtained.  Contributors jumped in.&lt;br /&gt;
&lt;br /&gt;
'''Phase II - Definitions:'''&lt;br /&gt;
&lt;br /&gt;
* Define Common Business Application Types – Stub Started.&lt;br /&gt;
* Define Security Assessment Types – Need Stub.&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''&lt;br /&gt;
&lt;br /&gt;
* Define Standard Application Assessment Process – Need Stub&lt;br /&gt;
* Define Standard Assessment Scope Per Application Type – Need Stub&lt;br /&gt;
* Define Standard Testing Boundaries For Application Assessments – Need Stub&lt;br /&gt;
* Define Business End Preparation For Application Assessment – Need Stub&lt;br /&gt;
* Establish Where In SDLC Should Assessment Steps Be Defined/Conducted – Need Stub&lt;br /&gt;
* Establish Baseline Assessor Qualifications And Evaluation Criteria – Need Stub&lt;br /&gt;
&lt;br /&gt;
Also refer to project Roadmap.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
* Vinay Bansal, Cisco Systems&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9188</id>
		<title>Category:OWASP Application Security Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9188"/>
				<updated>2006-08-22T14:25:57Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Application Security Metrics Security Project ==&lt;br /&gt;
&lt;br /&gt;
This OWASP Project will first identify and provide the OWASP community a set of application security metrics that have been found by contributors to be effective in measuring application security.  This will be followed by the development of new metrics that build on the initial metrics foundation to fulfill unmet metrics requirements.&lt;br /&gt;
The goals of this Project are to make a baseline set of application security metrics available to the OWASP community and subsequently to provide a forum for the community to contribute metrics back into the baseline. &lt;br /&gt;
&lt;br /&gt;
== Project Guiding Principles: ==&lt;br /&gt;
&lt;br /&gt;
The Application Security Metrics Security Project Project’s Guiding Principles were created in order to express the intentions of its contributors when designing application security metrics.&lt;br /&gt;
   &lt;br /&gt;
* Effective security metrics have proven to be challenging to develop.  As such, provide a means for the OWASP community to initially leverage what others have developed and find useful (i.e., provide the OWASP community useful metrics in use today).&lt;br /&gt;
  &lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature with other security metrics initiatives such as securitymetrics.org, Systems Security Engineering Capability Maturity Model (SSE-CMM), etc.&lt;br /&gt;
&lt;br /&gt;
* In selecting best practice metrics, make use of high-level filters.  For example, use Dr. Dan Geer’s decision support mantra regarding security metrics: “How would that proposed measure advance appropriate decision making?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Link each metric to the business driver for the metric (e.g., Metric “X” helps support regulatory compliance and risk management objectives.”&lt;br /&gt;
&lt;br /&gt;
Comments to the editor or endorsements are welcome.&lt;br /&gt;
&lt;br /&gt;
== Project Scope: ==&lt;br /&gt;
&lt;br /&gt;
In keeping with OWASP’s mission, this project will focus primarily on application security metrics.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Metrics Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Application Security Metrics Project mailing list or view the archives, please visit the subscription page.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors: ==&lt;br /&gt;
&lt;br /&gt;
If you contribute to this Project, please add your name here&lt;br /&gt;
Project Lead:&lt;br /&gt;
 &lt;br /&gt;
* Bob Austin of KoreLogic Security.  He can be reached at austinb@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
&lt;br /&gt;
* Cliff Barlow, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project_Roadmap&amp;diff=9187</id>
		<title>Category:OWASP Application Security Metrics Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project_Roadmap&amp;diff=9187"/>
				<updated>2006-08-22T14:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* DETAILED PHASE ONE TASKS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Subject to Contributor feedback, the following Roadmap is proposed.  Phase One tasks are more specifically defined.  Phase Two tasks will be developed and defined over time based on Phase One experience.&lt;br /&gt;
&lt;br /&gt;
== Proposed Project Phases: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase One - Collect and Provide Proven Metrics'''&lt;br /&gt;
&lt;br /&gt;
The objective is to provide useful current state metrics to the OWASP community in the near-term.&lt;br /&gt;
&lt;br /&gt;
'''Phase Two - Develop “Next Generation” metrics'''&lt;br /&gt;
&lt;br /&gt;
Develop new metrics using Contributor feedback on Phase One metrics and metrics that organizations have asked for but do not currently exist.&lt;br /&gt;
&lt;br /&gt;
== Summary of Proposed Phase One Tasks ==&lt;br /&gt;
&lt;br /&gt;
* Comment Period for Proposed Project Approach, Solicit Contributor Support&lt;br /&gt;
* Develop Metric Collection Survey Instrument&lt;br /&gt;
* Solicit Organizational Participants&lt;br /&gt;
* Conduct Metric Collection Survey&lt;br /&gt;
* Organize and Analyze Collected Survey Data&lt;br /&gt;
* Prepare Draft Findings and Provide to Reviewers&lt;br /&gt;
* Comment Period for Published Draft Findings&lt;br /&gt;
* Publish Final Findings, Metrics and Resources&lt;br /&gt;
* Conduct Phase One Project Post-Mortem&lt;br /&gt;
&lt;br /&gt;
== Detailed Phase One Tasks ==&lt;br /&gt;
&lt;br /&gt;
'''Task 1 – Comment Period for Proposed Project Approach'''&lt;br /&gt;
&lt;br /&gt;
Solicit Contributor feedback to ensure the most effective and widely supported approach. &lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 1st, 2006&lt;br /&gt;
Current Status:	Call for Contributors &lt;br /&gt;
&lt;br /&gt;
'''Task 2 – Develop Metric Collection Survey Instrument'''&lt;br /&gt;
&lt;br /&gt;
Develop a survey instrument that can be used by Contributors to gather metrics data in a uniform fashion.  Design considerations will include “organizational” demographic data required (e.g., industry vertical), the format of the metric description, etc.  Ideally, we can categorize the metric types using a standard nomenclature.  The final survey instrument will be based on the 80/20 principle – developing the “perfect” instrument will excessively delay the Project.  Contributor support in developing a survey form that will allow efficient data aggregation and analysis would be appreciated (or at least ideas how this could be accomplished).  &lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 15, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	Bob Austin&lt;br /&gt;
&lt;br /&gt;
'''Task 3– Solicit Organizational Participants'''&lt;br /&gt;
&lt;br /&gt;
Contributors will be asked to approach organizations that are known to have effective metrics in use and request their (anonymous) participation in the survey. It may be wise to limit the number of organizations participating in the survey to 30 or so organizations.  One incentive to participate is the sharing of current “best practice” metrics.   From a confidentiality perspective, each Contributor would ensure that data provided by an organization is sanitized to ensure anonymity.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 15, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 4 – Conduct Metric Collection Survey'''&lt;br /&gt;
&lt;br /&gt;
Using the survey instrument, collect survey data.  It may be wise to conduct a “pilot” survey with 1 or 2 organizations, make fine-tuning adjustments to the survey instrument, and then complete the surveys.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by September 15, 2006 (this date is particularly dependent upon Contributor support)&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 5 – Organize and Analyze Collected Survey Data'''&lt;br /&gt;
&lt;br /&gt;
This will involve merging and organizing the collected data to allow effective analysis and presentation of the data. &lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 6 – Prepare Draft Findings and Provide to Reviewers'''&lt;br /&gt;
&lt;br /&gt;
We envision capturing a number of key data points including a description of metrics used, consumers of the metrics, length of time used, barriers to metric collection, metrics needed, planned metrics initiatives, useful tools/resources that facilitate metrics collection/analysis, etc.  We also will attempt to provide insight into management’s interest and support for the metrics program.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 7 – Comment Period for Published Draft Findings'''&lt;br /&gt;
&lt;br /&gt;
Solicit feedback from the OWASP community, address errors/ambiguity.  Make edits based on feedback.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 8 – Publish Final Findings, Metrics, and Resources'''&lt;br /&gt;
&lt;br /&gt;
Self-explanatory.  Ideally, present the metrics in a way that Contributors can continue to add to and comment on over time.  Create a Resources Page that incorporates the resources recommended by survey participants.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 9 – Conduct Phase One Project Post-Mortem'''&lt;br /&gt;
&lt;br /&gt;
Solicit feedback and lessons learned on Phase One to improve Phase Two approach.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Metrics Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project_Roadmap&amp;diff=9186</id>
		<title>Category:OWASP Application Security Metrics Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project_Roadmap&amp;diff=9186"/>
				<updated>2006-08-22T14:23:09Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Subject to Contributor feedback, the following Roadmap is proposed.  Phase One tasks are more specifically defined.  Phase Two tasks will be developed and defined over time based on Phase One experience.&lt;br /&gt;
&lt;br /&gt;
== Proposed Project Phases: ==&lt;br /&gt;
&lt;br /&gt;
'''Phase One - Collect and Provide Proven Metrics'''&lt;br /&gt;
&lt;br /&gt;
The objective is to provide useful current state metrics to the OWASP community in the near-term.&lt;br /&gt;
&lt;br /&gt;
'''Phase Two - Develop “Next Generation” metrics'''&lt;br /&gt;
&lt;br /&gt;
Develop new metrics using Contributor feedback on Phase One metrics and metrics that organizations have asked for but do not currently exist.&lt;br /&gt;
&lt;br /&gt;
== Summary of Proposed Phase One Tasks ==&lt;br /&gt;
&lt;br /&gt;
* Comment Period for Proposed Project Approach, Solicit Contributor Support&lt;br /&gt;
* Develop Metric Collection Survey Instrument&lt;br /&gt;
* Solicit Organizational Participants&lt;br /&gt;
* Conduct Metric Collection Survey&lt;br /&gt;
* Organize and Analyze Collected Survey Data&lt;br /&gt;
* Prepare Draft Findings and Provide to Reviewers&lt;br /&gt;
* Comment Period for Published Draft Findings&lt;br /&gt;
* Publish Final Findings, Metrics and Resources&lt;br /&gt;
* Conduct Phase One Project Post-Mortem&lt;br /&gt;
&lt;br /&gt;
== DETAILED PHASE ONE TASKS ==&lt;br /&gt;
&lt;br /&gt;
'''Task 1 – Comment Period for Proposed Project Approach'''&lt;br /&gt;
&lt;br /&gt;
Solicit Contributor feedback to ensure the most effective and widely supported approach. &lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 1st, 2006&lt;br /&gt;
Current Status:	Call for Contributors &lt;br /&gt;
&lt;br /&gt;
'''Task 2 – Develop Metric Collection Survey Instrument'''&lt;br /&gt;
&lt;br /&gt;
Develop a survey instrument that can be used by Contributors to gather metrics data in a uniform fashion.  Design considerations will include “organizational” demographic data required (e.g., industry vertical), the format of the metric description, etc.  Ideally, we can categorize the metric types using a standard nomenclature.  The final survey instrument will be based on the 80/20 principle – developing the “perfect” instrument will excessively delay the Project.  Contributor support in developing a survey form that will allow efficient data aggregation and analysis would be appreciated (or at least ideas how this could be accomplished).  &lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 15, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	Bob Austin&lt;br /&gt;
&lt;br /&gt;
'''Task 3– Solicit Organizational Participants'''&lt;br /&gt;
&lt;br /&gt;
Contributors will be asked to approach organizations that are known to have effective metrics in use and request their (anonymous) participation in the survey. It may be wise to limit the number of organizations participating in the survey to 30 or so organizations.  One incentive to participate is the sharing of current “best practice” metrics.   From a confidentiality perspective, each Contributor would ensure that data provided by an organization is sanitized to ensure anonymity.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by August 15, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 4 – Conduct Metric Collection Survey'''&lt;br /&gt;
&lt;br /&gt;
Using the survey instrument, collect survey data.  It may be wise to conduct a “pilot” survey with 1 or 2 organizations, make fine-tuning adjustments to the survey instrument, and then complete the surveys.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame: Complete by September 15, 2006 (this date is particularly dependent upon Contributor support)&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 5 – Organize and Analyze Collected Survey Data'''&lt;br /&gt;
&lt;br /&gt;
This will involve merging and organizing the collected data to allow effective analysis and presentation of the data. &lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 6 – Prepare Draft Findings and Provide to Reviewers'''&lt;br /&gt;
&lt;br /&gt;
We envision capturing a number of key data points including a description of metrics used, consumers of the metrics, length of time used, barriers to metric collection, metrics needed, planned metrics initiatives, useful tools/resources that facilitate metrics collection/analysis, etc.  We also will attempt to provide insight into management’s interest and support for the metrics program.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 7 – Comment Period for Published Draft Findings'''&lt;br /&gt;
&lt;br /&gt;
Solicit feedback from the OWASP community, address errors/ambiguity.  Make edits based on feedback.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 8 – Publish Final Findings, Metrics, and Resources'''&lt;br /&gt;
&lt;br /&gt;
Self-explanatory.  Ideally, present the metrics in a way that Contributors can continue to add to and comment on over time.  Create a Resources Page that incorporates the resources recommended by survey participants.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:	&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
'''Task 9 – Conduct Phase One Project Post-Mortem'''&lt;br /&gt;
&lt;br /&gt;
Solicit feedback and lessons learned on Phase One to improve Phase Two approach.&lt;br /&gt;
&lt;br /&gt;
Target Time Frame:&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Metrics Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=9185</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=9185"/>
				<updated>2006-08-22T13:53:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Project descriptions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team.&lt;br /&gt;
&lt;br /&gt;
==Proposing a new project==&lt;br /&gt;
&lt;br /&gt;
To propose a new project, please send an email to owasp@owasp.org. Each project should have a roadmap page that details the current set of tasks and rough schedule. The page should be named &amp;quot;OWASP XXX Project Roadmap&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project descriptions==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP AJAX Security Project|OWASP AJAX Security Project]] - investigating the security of AJAX enabled applications&lt;br /&gt;
* [[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]] - establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment&lt;br /&gt;
* [[:Category:OWASP Application Security Metrics Project|OWASP Application Security Metrics Project]] - identify and provide a set of application security metrics that have been found by contributors to be effective in measuring application security  &lt;br /&gt;
* [[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]] - an FAQ covering many application security topics&lt;br /&gt;
* [[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]] - a JavaScript based web application security testing suite&lt;br /&gt;
* [[:Category:OWASP CLASP Project|OWASP CLASP Project]] - a project focused on defining process elements that reinforce application security&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Project]] - a new project to capture best practices for reviewing code&lt;br /&gt;
* [[:Category:OWASP Guide Project|OWASP Guide Project]] - a massive document covering all aspects of web application and web service security&lt;br /&gt;
* [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]] - a comprehensive and integrated guide to the fundamental building blocks of application security&lt;br /&gt;
* [[:Category:OWASP Legal Project|OWASP Legal Project]] - a project focused on contracting for secure software&lt;br /&gt;
* [[:Category:OWASP Logging Project|OWASP Logging Project]] - a project to define best practices for logging and log management&lt;br /&gt;
* [[:Category:OWASP Metrics Project|OWASP Metrics Project]] - a project to define workable application security metrics&lt;br /&gt;
* [[:Category:OWASP .NET Project|OWASP .NET Project]] - a project focused on helping .NET developers build secure applications&lt;br /&gt;
* [[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]] - a project focused on combining automated capabilities with complete manual testing to get the best results&lt;br /&gt;
* [[:Category:OWASP PHP Project|OWASP PHP Project]] - a project focused on helping PHP developers build secure applications&lt;br /&gt;
* [[:Category:OWASP Java Project|OWASP Java Project]] - a project focused on helping Java and J2EE developers build secure applications&lt;br /&gt;
* [[:Category:OWASP Risk Management Project|OWASP Risk Management Project]] - a new project focused on processes for managing application security risk&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Project]] - a project focused on application security testing procedures and checklists&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] - an awareness document that describes the top ten web application security vulnerabilities&lt;br /&gt;
* [[:Category:OWASP Validation Project|OWASP Validation Project]] - a project that provides guidance and tools related to validation. &lt;br /&gt;
* [[:Category:OWASP WASS Project|OWASP WASS Project]] - a standards project to develop more concrete criteria for secure applications&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] - an online training environment for hands-on learning about application security&lt;br /&gt;
* [[:Category:OWASP WebScarab Project|OWASP WebScarab Project]] - a tool for performing all types of security testing on web applications and web services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Project Mailing Lists]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9184</id>
		<title>Category:OWASP Application Security Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9184"/>
				<updated>2006-08-22T13:48:03Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Application Security Metrics Security Project ==&lt;br /&gt;
&lt;br /&gt;
This OWASP Project will first identify and provide the OWASP community a set of application security metrics that have been found by contributors to be effective in measuring application security.  This will be followed by the development of new metrics that build on the initial metrics foundation to fulfill unmet metrics requirements.&lt;br /&gt;
The goals of this Project are to make a baseline set of application security metrics available to the OWASP community and subsequently to provide a forum for the community to contribute metrics back into the baseline. &lt;br /&gt;
&lt;br /&gt;
== Project Guiding Principles: ==&lt;br /&gt;
&lt;br /&gt;
The Application Security Metrics Security Project Project’s Guiding Principles were created in order to express the intentions of its contributors when designing application security metrics.&lt;br /&gt;
   &lt;br /&gt;
* Effective security metrics have proven to be challenging to develop.  As such, provide a means for the OWASP community to initially leverage what others have developed and find useful (i.e., provide the OWASP community useful metrics in use today).&lt;br /&gt;
  &lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature with other security metrics initiatives such as securitymetrics.org, Systems Security Engineering Capability Maturity Model (SSE-CMM), etc.&lt;br /&gt;
&lt;br /&gt;
* In selecting best practice metrics, make use of high-level filters.  For example, use Dr. Dan Geer’s decision support mantra regarding security metrics: “How would that proposed measure advance appropriate decision making?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Link each metric to the business driver for the metric (e.g., Metric “X” helps support regulatory compliance and risk management objectives.”&lt;br /&gt;
&lt;br /&gt;
Comments to the editor or endorsements are welcome.&lt;br /&gt;
&lt;br /&gt;
== Project Scope: ==&lt;br /&gt;
&lt;br /&gt;
In keeping with OWASP’s mission, this project will focus primarily on application security metrics.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Metrics Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Application Security Metrics Project mailing list or view the archives, please visit the subscription page.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors: ==&lt;br /&gt;
&lt;br /&gt;
If you contribute to this Project, please add your name here&lt;br /&gt;
Project Lead:&lt;br /&gt;
 &lt;br /&gt;
* Bob Austin of KoreLogic Security.  He can be reached at austinb@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
&lt;br /&gt;
* Cliff Barlow, KoreLogic Security&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9182</id>
		<title>Category:OWASP Application Security Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Metrics_Project&amp;diff=9182"/>
				<updated>2006-08-22T13:41:21Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Application Security Metrics Project&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7966</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7966"/>
				<updated>2006-07-24T16:41:52Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: [[Image:Kore_Logo.jpg]][http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Kore_Logo.jpg&amp;diff=7958</id>
		<title>File:Kore Logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Kore_Logo.jpg&amp;diff=7958"/>
				<updated>2006-07-24T16:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7955</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7955"/>
				<updated>2006-07-24T16:33:56Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Assessment Standards Project is sponsored by: KoreLogic, Inc. [http://www.korelogic.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=7952</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=7952"/>
				<updated>2006-07-24T16:26:36Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Project descriptions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team.&lt;br /&gt;
&lt;br /&gt;
==Proposing a new project==&lt;br /&gt;
&lt;br /&gt;
To propose a new project, please send an email to owasp@owasp.org. Each project should have a roadmap page that details the current set of tasks and rough schedule. The page should be named &amp;quot;OWASP XXX Project Roadmap&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project descriptions==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP AJAX Security Project|OWASP AJAX Security Project]] - investigating the security of AJAX enabled applications&lt;br /&gt;
* [[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]] - establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment&lt;br /&gt;
* [[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]] - an FAQ covering many application security topics&lt;br /&gt;
* [[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]] - a JavaScript based web application security testing suite&lt;br /&gt;
* [[:Category:OWASP CLASP Project|OWASP CLASP Project]] - a project focused on defining process elements that reinforce application security&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Project]] - a new project to capture best practices for reviewing code&lt;br /&gt;
* [[:Category:OWASP Guide Project|OWASP Guide Project]] - a massive document covering all aspects of web application and web service security&lt;br /&gt;
* [[:Category:OWASP Legal Project|OWASP Legal Project]] - a project focused on contracting for secure software&lt;br /&gt;
* [[:Category:OWASP Logging Project|OWASP Logging Project]] - a project to define best practices for logging and log management&lt;br /&gt;
* [[:Category:OWASP Metrics Project|OWASP Metrics Project]] - a project to define workable application security metrics&lt;br /&gt;
* [[:Category:OWASP .NET Project|OWASP .NET Project]] - a project focused on helping .NET developers build secure applications&lt;br /&gt;
* [[:Category:OWASP PHP Project|OWASP PHP Project]] - a project focused on helping PHP developers build secure applications&lt;br /&gt;
* [[:Category:OWASP Java Project|OWASP Java Project]] - a project focused on helping Java and J2EE developers build secure applications&lt;br /&gt;
* [[:Category:OWASP Risk Management Project|OWASP Risk Management Project]] - a new project focused on processes for managing application security risk&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Project]] - a project focused on application security testing procedures and checklists&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] - an awareness document that describes the top ten web application security vulnerabilities&lt;br /&gt;
* [[:Category:OWASP Validation Project|OWASP Validation Project]] - a project that provides guidance and tools related to validation. &lt;br /&gt;
* [[:Category:OWASP WASS Project|OWASP WASS Project]] - a standards project to develop more concrete criteria for secure applications&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] - an online training environment for hands-on learning about application security&lt;br /&gt;
* [[:Category:OWASP WebScarab Project|OWASP WebScarab Project]] - a tool for performing all types of security testing on web applications and web services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Project Mailing Lists]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7919</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7919"/>
				<updated>2006-07-24T10:58:03Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
* Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
* Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
* Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
* Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
* Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
* Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
* Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
** Define degree of assessment depth per level&lt;br /&gt;
** Define testing components required per level&lt;br /&gt;
** Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
** Establish linkages between level results and security metrics derived&lt;br /&gt;
** Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
* Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
* Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
* Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7918</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7918"/>
				<updated>2006-07-24T10:41:22Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
- Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
- Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
- Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
- Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
- Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
- Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
  - Define degree of assessment depth per level&lt;br /&gt;
  - Define testing components required per level&lt;br /&gt;
  - Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
  - Establish linkages between level results and security metrics derived&lt;br /&gt;
  - Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
- Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
- Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributers ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
&lt;br /&gt;
- Bob Austin, KoreLogic Security&lt;br /&gt;
&lt;br /&gt;
- Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7917</id>
		<title>Category:OWASP Application Security Assessment Standards Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Assessment_Standards_Project&amp;diff=7917"/>
				<updated>2006-07-24T10:28:14Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: Initial population&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Currently there is a lack of standardization over what constitutes an application security assessment.  With no single set of criteria being referenced, it is suggested that OWASP establish a set of standards defining and establishing a baseline approach to conducting differing types/levels of application security assessment.  The standards should be flexible in design to accommodate a range of security assurance levels.  The standards should not be viewed as placing requirements on any party. Rather, the standards should make recommendations about what should be done to be consistent with what the OWASP community believes is best practice.  Adhering to the standards should help increase end user organization confidence that assessments meet an industry agreed-upon approach.&lt;br /&gt;
&lt;br /&gt;
== Objective ==&lt;br /&gt;
&lt;br /&gt;
The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  The following are seen as key tasks in order to meet this objective:&lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” nomenclature and definitions for common business application types. &lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” nomenclature and definitions of the differing security assessment types. &lt;br /&gt;
&lt;br /&gt;
- Define standard application assessment process in SWIM flow chart. &lt;br /&gt;
&lt;br /&gt;
- Define standard assessment scope per application type. &lt;br /&gt;
&lt;br /&gt;
- Define standard testing boundaries for application assessments. &lt;br /&gt;
&lt;br /&gt;
- Define what is needed on business end to prepare for application assessment. &lt;br /&gt;
&lt;br /&gt;
- Establish where in SDLC should assessment steps be defined/conducted. &lt;br /&gt;
&lt;br /&gt;
- Where practical, attempt to “standardize” skills nomenclature and establish baseline assessor qualifications and evaluation criteria. &lt;br /&gt;
&lt;br /&gt;
- Establish a common set of application assessment levels:&lt;br /&gt;
&lt;br /&gt;
  - Define degree of assessment depth per level&lt;br /&gt;
  - Define testing components required per level&lt;br /&gt;
  - Establish level of tool usage/type vs. hands on assessment per level&lt;br /&gt;
  - Establish linkages between level results and security metrics derived&lt;br /&gt;
  - Establish linkages between levels and Security Maturity Models &lt;br /&gt;
&lt;br /&gt;
- Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
&lt;br /&gt;
- Document integration/linkages to other OWASP projects.&lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP Application Security Assessment Standards Project useful. Please contribute back to the project by sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page. &lt;br /&gt;
&lt;br /&gt;
== Project Contributer ==&lt;br /&gt;
&lt;br /&gt;
The Assessment Standards project lead is Cliff Barlow of KoreLogic Security.  He can be reached at cbarlow@korelogic.com. &lt;br /&gt;
&lt;br /&gt;
Key contributors:&lt;br /&gt;
- Bob Austin, KoreLogic Security&lt;br /&gt;
- Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7916</id>
		<title>OWASP Application Security Assessment Standards Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7916"/>
				<updated>2006-07-24T10:20:04Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  &lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Overall Roadmap Phases ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach''':  Comment Period for Proposed Project Approach, Solicit Contributor Support&lt;br /&gt;
&lt;br /&gt;
'''Phase II – Application Assessment Definitions:'''  Establish core assessment definitions to ensure common base terminology.&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context:'''  Establish standard assessment context, selection, qualification and process frameworks.&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels:'''  Establish a common set of application assessment levels to be used as business guidance to ensure conducting appropriate level based on business-application-security requirements.&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration:'''  Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
&lt;br /&gt;
== Per Phase Project Objectives ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach and Objectives'''&lt;br /&gt;
Project Objective:  Solicit Contributor feedback to ensure the most effective and widely supported approach.&lt;br /&gt;
Target Time Frame:  August, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:  &lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase II – Application Assessment Definitions'''&lt;br /&gt;
Project Objective:  Establish common business application and security assessment type’s definitions. &lt;br /&gt;
Target Time Frame:  September, 2006&lt;br /&gt;
Current Status:	Call for Volunteers &lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard application assessment process in SWIM flow chart.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard assessment scope of work per application type.  Includes standard testing boundaries and requirements/needs placed upon end user requesting assessment.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Plot where within standard System Development Lifecycle (SDLC) application security assessment steps should be defined and conducted.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Establish common set of assessor qualifications and evaluation criteria to facilitate end service user ability to determine competence per assessment type.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
Target Time Frame:	December, 2006&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Create assessment levels based on previous Phase III objective.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
Target Time Frame:	March, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II. Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration:'''&lt;br /&gt;
Project Objective:	Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
Target Time Frame:	July, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phases I through III.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7915</id>
		<title>OWASP Application Security Assessment Standards Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7915"/>
				<updated>2006-07-24T10:11:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: /* Per Phase Project Objectives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  &lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Overall Roadmap Phases ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach''':  Comment Period for Proposed Project Approach, Solicit Contributor Support&lt;br /&gt;
'''&lt;br /&gt;
Phase II – Application Assessment Definitions:'''  Establish core assessment definitions to ensure common base terminology.&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context:'''  Establish standard assessment context, selection, qualification and process frameworks.&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels:'''  Establish a common set of application assessment levels to be used as business guidance to ensure conducting appropriate level based on business-application-security requirements.&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration:'''  Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Per Phase Project Objectives ==&lt;br /&gt;
'''&lt;br /&gt;
Phase I – Project Approach and Objectives'''&lt;br /&gt;
Project Objective:	Solicit Contributor feedback to ensure the most effective and widely supported approach.&lt;br /&gt;
Target Time Frame:	August, 2006&lt;br /&gt;
Current Status:	Call for Volunteers &lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:&lt;br /&gt;
	&lt;br /&gt;
&lt;br /&gt;
'''Phase II – Application Assessment Definitions'''&lt;br /&gt;
Project Objective:	Establish common business application and security assessment type’s definitions.&lt;br /&gt;
Target Time Frame:	September, 2006&lt;br /&gt;
Current Status:	Call for Volunteers &lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard application assessment process in SWIM flow chart.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard assessment scope of work per application type.  Includes standard testing boundaries and requirements/needs placed upon end user requesting assessment.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Plot where within standard System Development Lifecycle (SDLC) application security assessment steps should be defined and conducted.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Establish common set of assessor qualifications and evaluation criteria to facilitate end service user ability to determine competence per assessment type.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
Target Time Frame:	December, 2006&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Create assessment levels based on previous Phase III objective.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
Target Time Frame:	March, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II. Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration: ''' &lt;br /&gt;
Project Objective:	Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
Target Time Frame:	July, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phases I through III.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7914</id>
		<title>OWASP Application Security Assessment Standards Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project_Roadmap&amp;diff=7914"/>
				<updated>2006-07-24T10:09:44Z</updated>
		
		<summary type="html">&lt;p&gt;Cbarlow: Initial population of project roadmap&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed, who should be involved and what level of assessment is appropriate based on business requirements.  &lt;br /&gt;
&lt;br /&gt;
This project will not define how to technically to conduct an assessment (refer to OWASP Testing Project); it is instead meant to tie business operations and information management practices to application security in order to establish a common, consistent set of standards which provide guidance in conducting such assessments.  &lt;br /&gt;
&lt;br /&gt;
== Overall Roadmap Phases ==&lt;br /&gt;
&lt;br /&gt;
'''Phase I – Project Approach''':  Comment Period for Proposed Project Approach, Solicit Contributor Support&lt;br /&gt;
'''&lt;br /&gt;
Phase II – Application Assessment Definitions:'''  Establish core assessment definitions to ensure common base terminology.&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context:'''  Establish standard assessment context, selection, qualification and process frameworks.&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels:'''  Establish a common set of application assessment levels to be used as business guidance to ensure conducting appropriate level based on business-application-security requirements.&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration:'''  Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Per Phase Project Objectives ==&lt;br /&gt;
'''&lt;br /&gt;
Phase I – Project Approach and Objectives'''&lt;br /&gt;
Project Objective:	Solicit Contributor feedback to ensure the most effective and widely supported approach.&lt;br /&gt;
Target Time Frame:	August, 2006&lt;br /&gt;
Current Status:	Call for Volunteers &lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase II – Application Assessment Definitions'''&lt;br /&gt;
Project Objective:	Establish common business application and security assessment type’s definitions.&lt;br /&gt;
Target Time Frame:	September, 2006&lt;br /&gt;
Current Status:	Call for Volunteers &lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard application assessment process in SWIM flow chart.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Define standard assessment scope of work per application type.  Includes standard testing boundaries and requirements/needs placed upon end user requesting assessment.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Plot where within standard System Development Lifecycle (SDLC) application security assessment steps should be defined and conducted.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase III – Assessment Context'''&lt;br /&gt;
Project Objective:	Establish common set of assessor qualifications and evaluation criteria to facilitate end service user ability to determine competence per assessment type.&lt;br /&gt;
Target Time Frame:	October, 2006&lt;br /&gt;
Current Status:	Call for Volunteers&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish assessment level system common terminology and decision criteria - Included is analysis of potentially corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.).&lt;br /&gt;
Target Time Frame:	December, 2006&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Create assessment levels based on previous Phase III objective.  Define assessment depth, testing components required, and level of tool usage/type (not product names) of tools used per level.&lt;br /&gt;
Target Time Frame:	March, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.  Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
'''&lt;br /&gt;
Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Document corresponding linkages between assessment levels and common security metrics, security assurance/maturity models, related legislation, other documented national standards defined as component of first Phase III objective.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase IV – Assessment Levels'''&lt;br /&gt;
Project Objective:	Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed.&lt;br /&gt;
Target Time Frame:	May, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phase I and II. Calling for future volunteers.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
'''Phase V – OWASP Integration: ''' &lt;br /&gt;
Project Objective:	Document integration components and linkages with existing and underway OWASP projects.&lt;br /&gt;
Target Time Frame:	July, 2007&lt;br /&gt;
Current Status:	In hold based on outcome of Phases I through III.&lt;br /&gt;
Contributors:	&lt;br /&gt;
Reviewers:	&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;/div&gt;</summary>
		<author><name>Cbarlow</name></author>	</entry>

	</feed>