<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Georghess</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Georghess"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Georghess"/>
		<updated>2026-05-09T03:23:42Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88475</id>
		<title>AppSec US 2010, CA/Attending Owasp Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88475"/>
				<updated>2010-09-01T13:43:30Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Page to manage the participation of the OWASP leaders at the [[AppSec_US_2010,_CA|AppSec USA in Irvine USA]]&lt;br /&gt;
 &lt;br /&gt;
===Attending Leaders - Confirmed===&lt;br /&gt;
&lt;br /&gt;
* [[User:Dancornell|Dan Cornell]]- ''San Antonio Chapter and Global Membership Committee''&lt;br /&gt;
* Tony UV - ''Atlanta Chapter''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]] - ''Podcast Project''&lt;br /&gt;
* [[User:MichaelCoates|Michael Coates]] - ''AppSensor project and Global Membership Committee''&lt;br /&gt;
* [[User:Knoblochmartin|Martin Knobloch]] - ''Education and Connections Committee''&lt;br /&gt;
* [[User:Rsnake|Robert Hansen]] - ''Connections Committee''&lt;br /&gt;
* [[User:Mtesauro|Matt Tesauro]] - ''Live CD project, Board Member''&lt;br /&gt;
* [[User:Wichers|Dave Wichers]] - ''Top 10 project, Board Member''&lt;br /&gt;
* [[User:brennan|Tom Brennan]] - ''NYC Chapter Leader, RFP Criteria project, OWASP-CRM, Board Member''&lt;br /&gt;
* [[User:Jeff_Williams|Jeff Williams]] - ''ESAPI project, Board Member''&lt;br /&gt;
* [[User:Dinis.cruz|Dinis Cruz]] - ''O2 Platform project, Board Member''&lt;br /&gt;
* [http://www.owasp.org/index.php/User:Dc David Campbell] - ''Denver Chapter, Industry Committee''&lt;br /&gt;
* [http://www.owasp.org/index.php/User:Justin42 Justin Clarke] - ''London Chapter and Connections Committee''&lt;br /&gt;
* Roman Hustad - ''Sacramento Chapter''&lt;br /&gt;
* Peter Dean - ''NYC Chapter Leader''&lt;br /&gt;
* Georg Hess - ''German Chapter, Industry Committee''&lt;br /&gt;
&lt;br /&gt;
'''Part of the conference organization'''&lt;br /&gt;
* Cassio Goldschmidt - ''Los Angeles Chapter''&lt;br /&gt;
* [[:User:Tin Zaw|Tin Zaw]] - ''Los Angeles Chapter''&lt;br /&gt;
* Howard Fore - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* Jon Bango - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* [[User:Richard greenberg|Richard Greenberg]] - ''Los Angeles Chapter''&lt;br /&gt;
* [http://twitter.com/nilematotle Neil Matatall] - ''[[http://www.owasp.org/index.php/Orange_County Orange County Chapter]]''&lt;br /&gt;
&lt;br /&gt;
===Also attending (part of OWASP community)===&lt;br /&gt;
* Joseph Dawson&lt;br /&gt;
&lt;br /&gt;
===Attending Leaders - TBC===&lt;br /&gt;
* [[User:Lorna Alamri|Lorna Alamri]] - ''Connections Committee''&lt;br /&gt;
&lt;br /&gt;
===Key WebAppSec players===&lt;br /&gt;
objective: identfy potential synergies between WebAppSec industry players and OWASP leaders (for example too meet and have a meeting)&lt;br /&gt;
&lt;br /&gt;
* Firefox Browser &lt;br /&gt;
** There are a number of Firefox employees participating and they have shown interest in talking to OWAPS about how we can work together&lt;br /&gt;
&lt;br /&gt;
===Developers and QA participating===&lt;br /&gt;
'''Sponsored by the Atlanta Chapter'''&lt;br /&gt;
Howard Fore (Atlanta Developer) - Howard Fore is a senior web developer in Atlanta, Georgia. He's involved in some high-visibility web projects at the Federal Reserve Bank of Atlanta. Increasing awareness of secure software development practices is an departmental objective for 2010 and he's a member of the security workgroup, which is leading the way in that endeavor. Other practices the security workgroup are implementing include static code analysis and code inspection.&lt;br /&gt;
&lt;br /&gt;
Jon Bango (Atlanta Developer) - Jon Bango is an Information Technology professional with over 13 years experience in the education, financial services and retail industries. Primarily working at the enterprise level, Jon has utilized the J2EE stack in building web applications for the largest home improvement retailer in the world. Most recently he has branched out into RIA technologies working in Adobe Flex and Microsoft Silverlight. Currently, Jon has transitioned into the dark arts at his company’s Information Assurance department in which the groundwork has been laid to utilize his developer talents to create a company wide secure coding initiative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Question:Should we also do the same tracking for other Developers and QA/Testing professionals?''&lt;br /&gt;
&lt;br /&gt;
===To do (tasks)===&lt;br /&gt;
* for each each participant&lt;br /&gt;
** link to MediaWiki user page&lt;br /&gt;
** add twitter accounts&lt;br /&gt;
*Travel arrangements&lt;br /&gt;
**  map travel dates&lt;br /&gt;
** when/where they are arriving &lt;br /&gt;
** where are they staying&lt;br /&gt;
* figure out what to do with the leaders when they are there&lt;br /&gt;
* should we create a welcome pack for these leaders?&lt;br /&gt;
* should we see if they need help in their travel arrangements?&lt;br /&gt;
* should we see if its possible to find a local host for the accomodation (it is always better than going into an hotel)?&lt;br /&gt;
* do we need a budget? if so, how much?&lt;br /&gt;
&lt;br /&gt;
[[Category:Connections Committee]]&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88474</id>
		<title>AppSec US 2010, CA/Attending Owasp Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88474"/>
				<updated>2010-09-01T13:42:42Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Page to manage the participation of the OWASP leaders at the [[AppSec_US_2010,_CA|AppSec USA in Irvine USA]]&lt;br /&gt;
 &lt;br /&gt;
===Attending Leaders - Confirmed===&lt;br /&gt;
&lt;br /&gt;
* [[User:Dancornell|Dan Cornell]]- ''San Antonio Chapter and Global Membership Committee''&lt;br /&gt;
* Tony UV - ''Atlanta Chapter''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]] - ''Podcast Project''&lt;br /&gt;
* [[User:MichaelCoates|Michael Coates]] - ''AppSensor project and Global Membership Committee''&lt;br /&gt;
* [[User:Knoblochmartin|Martin Knobloch]] - ''Education and Connections Committee''&lt;br /&gt;
* [[User:Rsnake|Robert Hansen]] - ''Connections Committee''&lt;br /&gt;
* [[User:Mtesauro|Matt Tesauro]] - ''Live CD project, Board Member''&lt;br /&gt;
* [[User:Wichers|Dave Wichers]] - ''Top 10 project, Board Member''&lt;br /&gt;
* [[User:brennan|Tom Brennan]] - ''NYC Chapter Leader, RFP Criteria project, OWASP-CRM, Board Member''&lt;br /&gt;
* [[User:Jeff_Williams|Jeff Williams]] - ''ESAPI project, Board Member''&lt;br /&gt;
* [[User:Dinis.cruz|Dinis Cruz]] - ''O2 Platform project, Board Member''&lt;br /&gt;
* [http://www.owasp.org/index.php/User:Dc David Campbell] - ''Denver Chapter, Industry Committee''&lt;br /&gt;
* [http://www.owasp.org/index.php/User:Justin42 Justin Clarke] - ''London Chapter and Connections Committee''&lt;br /&gt;
* Roman Hustad - ''Sacramento Chapter''&lt;br /&gt;
* Peter Dean - ''NYC Chapter Leader''&lt;br /&gt;
* [[User:georghess|Georg Hess]] - ''German Chapter, Industry Committee''&lt;br /&gt;
&lt;br /&gt;
'''Part of the conference organization'''&lt;br /&gt;
* Cassio Goldschmidt - ''Los Angeles Chapter''&lt;br /&gt;
* [[:User:Tin Zaw|Tin Zaw]] - ''Los Angeles Chapter''&lt;br /&gt;
* Howard Fore - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* Jon Bango - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* [[User:Richard greenberg|Richard Greenberg]] - ''Los Angeles Chapter''&lt;br /&gt;
* [http://twitter.com/nilematotle Neil Matatall] - ''[[http://www.owasp.org/index.php/Orange_County Orange County Chapter]]''&lt;br /&gt;
&lt;br /&gt;
===Also attending (part of OWASP community)===&lt;br /&gt;
* Joseph Dawson&lt;br /&gt;
&lt;br /&gt;
===Attending Leaders - TBC===&lt;br /&gt;
* [[User:Lorna Alamri|Lorna Alamri]] - ''Connections Committee''&lt;br /&gt;
&lt;br /&gt;
===Key WebAppSec players===&lt;br /&gt;
objective: identfy potential synergies between WebAppSec industry players and OWASP leaders (for example too meet and have a meeting)&lt;br /&gt;
&lt;br /&gt;
* Firefox Browser &lt;br /&gt;
** There are a number of Firefox employees participating and they have shown interest in talking to OWAPS about how we can work together&lt;br /&gt;
&lt;br /&gt;
===Developers and QA participating===&lt;br /&gt;
'''Sponsored by the Atlanta Chapter'''&lt;br /&gt;
Howard Fore (Atlanta Developer) - Howard Fore is a senior web developer in Atlanta, Georgia. He's involved in some high-visibility web projects at the Federal Reserve Bank of Atlanta. Increasing awareness of secure software development practices is an departmental objective for 2010 and he's a member of the security workgroup, which is leading the way in that endeavor. Other practices the security workgroup are implementing include static code analysis and code inspection.&lt;br /&gt;
&lt;br /&gt;
Jon Bango (Atlanta Developer) - Jon Bango is an Information Technology professional with over 13 years experience in the education, financial services and retail industries. Primarily working at the enterprise level, Jon has utilized the J2EE stack in building web applications for the largest home improvement retailer in the world. Most recently he has branched out into RIA technologies working in Adobe Flex and Microsoft Silverlight. Currently, Jon has transitioned into the dark arts at his company’s Information Assurance department in which the groundwork has been laid to utilize his developer talents to create a company wide secure coding initiative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Question:Should we also do the same tracking for other Developers and QA/Testing professionals?''&lt;br /&gt;
&lt;br /&gt;
===To do (tasks)===&lt;br /&gt;
* for each each participant&lt;br /&gt;
** link to MediaWiki user page&lt;br /&gt;
** add twitter accounts&lt;br /&gt;
*Travel arrangements&lt;br /&gt;
**  map travel dates&lt;br /&gt;
** when/where they are arriving &lt;br /&gt;
** where are they staying&lt;br /&gt;
* figure out what to do with the leaders when they are there&lt;br /&gt;
* should we create a welcome pack for these leaders?&lt;br /&gt;
* should we see if they need help in their travel arrangements?&lt;br /&gt;
* should we see if its possible to find a local host for the accomodation (it is always better than going into an hotel)?&lt;br /&gt;
* do we need a budget? if so, how much?&lt;br /&gt;
&lt;br /&gt;
[[Category:Connections Committee]]&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_John_Wilander&amp;diff=73195</id>
		<title>Global Conferences Committee - John Wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_John_Wilander&amp;diff=73195"/>
				<updated>2009-11-13T16:33:52Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;John Wilander&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | Chapter leader Sweden, Conference chair AppSec Research 2010&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP Global Conferences Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: white none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Yiannis Pavlosoglou &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Project Leader: JBroFuzz &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Full support towards being part of the conferences committee from the European side.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Carl-Johan Bostorp &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | OC-member AppSec Research 2010 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | John has consistently shown dedication to security for many years and have great people skills.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Arshan Dabirsiaghi &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Project leader &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | John has a sweet beard.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Eric Sheridan &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Project Leader &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Has a Mac too.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Georg Hess&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | German Chapter Leader&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Done already a great job on OWASP AppSec EU 2010.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65567</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65567"/>
				<updated>2009-07-08T14:30:37Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below Figure 4: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;69&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; PaaS Impact on Application Security Architecture, should be added as a last sentence of first paragraph &amp;quot;On the other hand, PaaS providers may offer built-in application security controls within their - already restricted - programming environment to help developers avoid known application vulnerabilities. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final thoughts&amp;quot; section: This section is completely lacking of &amp;quot;classical&amp;quot; web app vulnerabilities like OWASP Top 10 that currently are - and in my opinion will still be - most relevant also in the cloud context. I suggest to, at least, mention some of the classical attack vectors like e.g. Cross-Site-Scripting, SQL-Injection, OWASP Top10 etc. in addition to JavaScript etc. - and perhaps re-work this chapter with a bit more time later on.... &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65563</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65563"/>
				<updated>2009-07-08T14:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below Figure 4: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;69&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; PaaS Impact on Application Security Architecture, should be added as a last sentence of first paragraph &amp;quot;On the other hand, PaaS providers may offer built-in application security controls within their - already restricted - programming environment to help developers avoid known application vulnerabilities. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65561</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65561"/>
				<updated>2009-07-08T14:09:52Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below Figure 4: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;69&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; PaaS Impact on Application Security Architecture, should be added as a last sentence of first paragraph &amp;quot;On the other hand, PaaS providers may offer built-in application security controls within their - already restrictd - programming environment to help developers avoid known application vulnerabilities. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65555</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65555"/>
				<updated>2009-07-08T11:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below Figure 4: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; PaaS Impact on Application Security Architecture, should be added as a last sentence of first paragraph &amp;quot;On the other hand, PaaS providers may offer built-in application security controls within their - already restrictd - programming environment to help developers avoid known application vulnerabilities. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65554</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65554"/>
				<updated>2009-07-08T11:42:12Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below Figure 4: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65553</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65553"/>
				<updated>2009-07-08T11:41:35Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;67&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; First sentence below first graphic: should be rewritten &amp;quot;...and the vendor through application specific security services and controls and the Service Level Agreement (SLA)....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65552</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65552"/>
				<updated>2009-07-08T11:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, second sentence, should be rewritten &amp;quot;... put in place to secure the application itself, the host and the network....&amp;quot; . &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;66&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; IaaS Impact on Application Security Architecture, should be added as a last sentence &amp;quot;IaaS providers may offer - third-party or on their own - cloud application security specific services - e.g. Web App Security Scanning, Source Code Analysis or Web App Intrusion Detection/Prevention Systems - to increase security at the application layer and to support customers in fulfilling application specific compliance requirements. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65551</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65551"/>
				<updated>2009-07-08T11:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65550</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65550"/>
				<updated>2009-07-08T11:15:08Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Issues and Guidance, last sentence of first paragraph should be rewritten &amp;quot;... a set of application level controls and through the appropriate choice of cloud services - e.g. Web App Security Scanning, Source Code Analysis or Web App Firewalls - and the through the service agreement with the cloud vendor.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65549</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65549"/>
				<updated>2009-07-08T11:07:43Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65548</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65548"/>
				<updated>2009-07-08T10:43:36Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;11&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Could start with &amp;quot;Cloud Applications are Web Applications in particular. Thus, virtually all of the challenges of Web Application Security apply to cloud applications, too. This document focuses on the new challenges of web applications &amp;quot;living in the cloud&amp;quot; but all knowledge about &amp;quot;classical&amp;quot; Web Application Security such as provided by OWASP should still be considered.&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Georg Hess&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65547</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=65547"/>
				<updated>2009-07-08T10:17:22Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Adam Muntner/Adam.Muntner(at)quietmove.com/6024459801&lt;br /&gt;
&lt;br /&gt;
Arthur Hedge/ahedge(at)castleventures.com/9735388004&lt;br /&gt;
&lt;br /&gt;
Georg Hess/georg.hess(at)artofdefence.com/+4994160488958&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Include OWASP member attribution and affiliation. The more names, the better&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;27&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;PCI defines requirements above and beyond just payment processing. Challenges such as file integrity monitoring and patch management become more nebulous in a cloud&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;34&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;Additional considerations may include constructs such as receiving a document preservation notice where a court may order you to restore a system to a known point in time. The fluidity of a cloud makes this challenging&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;James McGovern&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The entire Domain 11, Application Security, seems to focus more on some minor architecture differences, but doesn't focus on acutal application level threats - XSS, CSRF, SQL etc injection attacks, and business logic holes such as authentication/authorization issues.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;65&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;For application security, the answer to each of these questions has two: what &lt;br /&gt;
security controls must the application provide over and above the controls inherent in the cloud &lt;br /&gt;
platform and how must an enterprise’s secure development lifecycle change to accommodate &lt;br /&gt;
cloud computing?&amp;quot;&lt;br /&gt;
This is the only quote in the Problem Statement which is relevant. The rest can safely be scrubbed. &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;70&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; &amp;quot;Final Thoughts&amp;quot; section: Attack methods are well known. OWASP Testing Guide is one point of reference, and OSSTM is another. How will malicious actors react? By being malicious actors. A list of web links for further research would be more useful.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;13&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Authentication mentioned - should refer to Authorization as well &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Adam Muntner &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;71&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; The [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]], [[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API]] and [[:Category:Software Assurance Maturity Model|OWASP Software Assurance Maturity Model]] should be added to the list of references &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Colin Watson &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;48&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Consideration should be given to having cloud providers produce audit reports of privileged user access and activity to the data owner.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Should be rewritten to &amp;quot;Domain 1 principles of cloud computing&amp;quot; or &amp;quot;Domain 1 principal characteristics of cloud computing&amp;quot;&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;28&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Should be &amp;quot;Procedures for addressing a Legal Hold;&amp;quot; instead of &amp;quot;Procedures for address a Legal Hold;&amp;quot; &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Arthur Hedge&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   &lt;br /&gt;
&lt;br /&gt;
Page #                          Comment                                  Your Name&lt;br /&gt;
===================================================================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=51360</id>
		<title>Global Industry Committee - Application 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=51360"/>
				<updated>2009-01-16T12:39:58Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Colin Watson&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* EU Summit 08 - OWASP Awards working session chair&lt;br /&gt;
* EU Summit 08 - Event organisational assistance&lt;br /&gt;
* Coordination of OWASP UK chapters' response ([[London#Other_Activities]]) to the UK's Central Office of Information draft document on browser standards for public websites&lt;br /&gt;
* Participation in nomination of [http://www.nominet.org.uk/news/latest/2008/?contentId=5147 OWASP for Nominet Best Practice Awards 2008]&lt;br /&gt;
* Speaker at OWASP London chapter meeting&lt;br /&gt;
* Individual member&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Industry Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Eduardo V. C. Neves&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Positive Security Project Leader and Education Global Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin is hands on professional which is able to make thinks done very quickly and in a high  quality fashion. I believe that he will be a great member for this committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Rook&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP Code Review Guide Contributor, OWASP Ireland Contributor&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has the drive and knowledge to lead OWASP efforts at the committee level. He has excellent knowledge across many security areas and a professional positive attitude towards helping people understand and embrace information security. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paulo Coimbra&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Project Manager&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin Watson was one of the OWASP Summit co-organizers. To me, his performance was absolutely outstanding. His calm reliability can be a valuable asset. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Campbell&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was instrumental in organizing the Portugal Summit, and provided much valuable input to the Intra Gov't affairs working group.  He will be a great asset to the Industry committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Rex Booth&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has been an active participant in the Industry Committee since its inception in Portugal.  He absolutely deserves to be an official member and we could certainly use his assistance!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Mano Paul&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Education Committee Chair&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was extremely helpful with all his voluntary helpful to make the OWASP EU summit at Portugal, a success. My interactions with him left me in respect of him for his background and experience and in what he has to offer to OWASP. I can vouch confidently that his official involvement in the Industry Committee will undoubtedly reflect positively on OWASP and you consideration would be appreciated. Highly recommend. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ivan Ristic&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Former OWASP London Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin is not only a regular visitor of OWASP London meetings, but someone who's willing to lend a hand when help is needed. He strikes me as a person who can be relied upon to do the right thing. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''8'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Georg Hess&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member, OWASP Germany Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin contributed from the very start of the Global Industry Committee - in particular with his expertise in the UK market. It is obvious that he should be &amp;quot;on board&amp;quot;. &lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=45176</id>
		<title>OWASP Working Session Top 10 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=45176"/>
				<updated>2008-10-30T18:17:27Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Top 10 2009'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Aims to provide a key awareness document for web application security.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:dave.wichers(at)owasp.org '''Dave Wichers''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org '''Jeff Williams''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-topten '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss current Top10 structure and objectives,&lt;br /&gt;
* Identify which information sources will be considered for analysis, Eg:&lt;br /&gt;
** MITRE&lt;br /&gt;
** Compromise DB's (Attrition, WASC etc) and bias due to reporting&lt;br /&gt;
** Anonomised penetration test results and the difficulty in obtaining&lt;br /&gt;
* Define methodology to collect attacks statistics,&lt;br /&gt;
* Define prioritisation approach&lt;br /&gt;
** Agree weighting between current or emerging threats&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5 &amp;amp; 7, 2008&amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
&lt;br /&gt;
Potential Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://cve.mitre.org/cve/ MITRE's Common Vulnerability Enumeration (CVE) Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/whid/whid.shtml WASC Web Hacking Incidents Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/statistics/ 2007 WASC Web Application Security Statistics Report]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The sources of input for the 2009 Top 10 will be identified.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The ordering scheme for the Top 10 will be determined.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Discussion of whether the existing document structure should be maintained or adjusted.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
''''''Bold text''''''== Working Session Participants ==&lt;br /&gt;
(Add your name by editing this table. On the right, just above this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paolo Perego&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Spike Reply&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|As penetration tester it woud be great to me to participating in writing the new Top 10. As code reviewer and Orizon project leader it would be very interesting in scouting dynamic threats in order to add some dynamic feature to my tool.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Denver&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Robert Mann&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|RBS / ABN AMRO&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Troy Leach&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://www.pcisecuritystandards.org/ PCI Security Standards Council]&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Technical Director&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Eoin Keary&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ernst &amp;amp; Young. Long time OWASP member (Code and Testing guides)&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I'd like to discuss about a new way to create the Top10 from the OWASP Community&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Giorgio Fedon&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I volunteered as a technical writer&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Martorella&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|S21sec&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in participating on the creating the Top 10, share some ideas.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Nishi Kumar&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Systems Architect (FIS) Global Web Development Group&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in participating and sharing ideas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|11&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Tom Brennan&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP/WhiteHat Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Want to discuss some of the stats we can share with OWASP&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|12&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Georg Hess&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP Germany&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| mainly to get some insight into the process&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Working_Session_OWASP_Strategic_Planning&amp;diff=45175</id>
		<title>Working Session OWASP Strategic Planning</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Working_Session_OWASP_Strategic_Planning&amp;diff=45175"/>
				<updated>2008-10-30T18:07:22Z</updated>
		
		<summary type="html">&lt;p&gt;Georghess: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Strategic Planning'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Discuss and prepare the OWASP Strategic Planing.    &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org Jeff Williams], [mailto:dinis.cruz(at)owasp.org Dinis Cruz], [mailto:dave.wichers(at)owasp.org Dave Wichers], [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:tomb(at)owasp.org Tom Brennan]. &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/admin/ws-strategic-planning/logout Subscription Page]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss OWASP Past, Present and Future,&lt;br /&gt;
* Projects organization and rating,&lt;br /&gt;
* Global Community Outreach (PR Issues, Pro Bono opportunities)  &lt;br /&gt;
* Procedures for OWASP Standardization,&lt;br /&gt;
* Discuss OWASP Governance,&lt;br /&gt;
* Discuss Chapter Governance.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 4 &amp;amp; 7, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot; or &amp;quot;Everybody is a Participant&amp;quot; - TBD&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions  &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Action Plan for 2009.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Strategies and recommendations for current OWASP projects.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1  &lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kate &amp;amp; Paulo&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Foundation&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Employees  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Denver&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter governance, etc&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP-Italy&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Steve Antoniewicz&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP NYC&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Partnerships&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in reaching out academia&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Georg Hess&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Germany&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Global topics and positioning&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Georghess</name></author>	</entry>

	</feed>