<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jie+Wang</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jie+Wang"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jie_Wang"/>
		<updated>2026-04-22T10:40:41Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256486</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256486"/>
				<updated>2019-12-25T10:34:55Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙，Zhang Kun 张坤&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' Xia Tianze 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广东：''' Xiao Wendi 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''河北：''' Wang Pengming 王鹏鸣&lt;br /&gt;
&lt;br /&gt;
'''河南：''' Xiao Haibo 肖海波， Yang Mingsheng 杨明生&lt;br /&gt;
&lt;br /&gt;
'''甘肃：''' Cai Xuping 蔡旭平&lt;br /&gt;
&lt;br /&gt;
'''福建：''' Cai Yong 蔡勇&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Zhu Shubo 祝书博&lt;br /&gt;
&lt;br /&gt;
'''四川：''' Ma Wei 马伟&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:miya@owasp.org.cn 许飞]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256485</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256485"/>
				<updated>2019-12-25T10:30:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙，Zhang Kun 张坤&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广东：''' Xiao Wendi 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''河北：''' Wang Pengming 王鹏鸣&lt;br /&gt;
&lt;br /&gt;
'''河南：''' Xiao Haibo 肖海波， Yang Mingsheng 杨明生&lt;br /&gt;
&lt;br /&gt;
'''甘肃：''' Cai Xuping 蔡旭平&lt;br /&gt;
&lt;br /&gt;
'''福建：''' Cai Yong 蔡勇&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Zhu Shubo 祝书博&lt;br /&gt;
&lt;br /&gt;
'''四川：''' Ma Wei 马伟&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:miya@owasp.org.cn 许飞]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256484</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256484"/>
				<updated>2019-12-25T10:28:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙，Zhang Kun 张坤&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广东：''' Xiao Wendi 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''河北：''' Wang Pengming 王鹏鸣&lt;br /&gt;
&lt;br /&gt;
'''河南：''' Xiao Haibo 肖海波， Yang Mingsheng 杨明生&lt;br /&gt;
&lt;br /&gt;
'''甘肃：''' Cai Xuping 蔡旭平&lt;br /&gt;
&lt;br /&gt;
'''福建：''' Cai Yong 蔡勇&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Zhu Shubo 祝书博&lt;br /&gt;
&lt;br /&gt;
'''四川：''' Ma Wei 马伟&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:miya@owasp.org.cn 许飞]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256483</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=256483"/>
				<updated>2019-12-25T10:24:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙，Zhang Kun 张坤&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广东：''' Xiao Wendi 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:miya@owasp.org.cn 许飞]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Proactive_Controls&amp;diff=256202</id>
		<title>OWASP Proactive Controls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Proactive_Controls&amp;diff=256202"/>
				<updated>2019-11-30T07:32:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Translations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Proactive-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 Proactive Controls 2018 ==&lt;br /&gt;
&lt;br /&gt;
Software developers are the foundation of any application. In order to achieve secure software, developers must be supported and helped by the organization they author code for. As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques. All tiers of a web application, the user interface, the business logic, the controller, the database code and more – all need to be developed with security in mind. This can be a very difficult task and developers are often set up for failure. Most developers did not learn about secure coding or crypto in school. The languages and frameworks that developers use to build web applications are often lacking critical core controls or are insecure by default in some way. It is also very rare when organizations provide developers with prescriptive requirements that guide them down the path of secure software. And even when they do, there may be security flaws inherent in the requirements and designs. When it comes to software, developers are often set up to lose the security game.&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten Proactive Controls 2018 is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development.&lt;br /&gt;
&lt;br /&gt;
# Define Security Requirements&lt;br /&gt;
# Leverage Security Frameworks and Libraries &lt;br /&gt;
# Secure Database Access&lt;br /&gt;
# Encode and Escape Data&lt;br /&gt;
# Validate All Inputs&lt;br /&gt;
# Implement Digital Identity&lt;br /&gt;
# Enforce Access Controls&lt;br /&gt;
# Protect Data Everywhere&lt;br /&gt;
# Implement Security Logging and Monitoring &lt;br /&gt;
#  Handle All Errors and Exceptions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For more information, see the complete document in the tab to the right.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;8:_Implement_Logging_and_Intrusion_Detection&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
The OWASP Proactive Controls document is free to use under the [https://creativecommons.org/licenses/by-sa/3.0/us/ Creative Commons ShareAlike 3 License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten Proactive Controls describes the most important control and control categories that every architect and developer should absolutely, 100% include in every project.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Use the extensive [[media:OWASP_Top_Ten_Proactive_Controls_v3.pptx|project presentation]] that expands on the information in the document.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jmanico Jim Manico] [mailto:jim.manico@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jim_Bird Jim Bird] [mailto:jimbird@shaw.ca @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Key Contributors ==&lt;br /&gt;
* [[User:Taras Ivashchenko|Taras Ivashchenko]] [mailto:taras.ivaschenko@owasp.org @] (Russian Translation)&lt;br /&gt;
* Jay Zudilin (Russian Translation)&lt;br /&gt;
* Danny Harris [mailto:danny.harris@owasp.org @]&lt;br /&gt;
* Hiroaki Kuramochi (Japanese Translation)&lt;br /&gt;
* Hiroshi Fujimoto (Japanese Translation)&lt;br /&gt;
* Hidenori Nagai (Japanese Translation)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Riotaro_OKADA Riotaro OKADA] [mailto:riotaro@owasp.org @] (Japanese Translation)&lt;br /&gt;
* Robert Dracea (Japanese Translation)&lt;br /&gt;
* Koichiro Watanabe (Japanese Translation)&lt;br /&gt;
* Tony Hsu Hsiang Chih (Chinese Translation)&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* [https://www.linkedin.com/in/eyalestrin Eyal Estrin] [mailto:eyal.estrin@gmail.com @] (Hebrew Translation)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Cyrille_Grandval Cyrille Grandval] [mailto:cyrille.grandval@owasp.org @] (French Translation)&lt;br /&gt;
* Frédéric Baillon [mailto:fbaillon@darkmira.com @] (French Translation)&lt;br /&gt;
* Danny Harris [mailto:danny.harris@owasp.org @]&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Andrew Van Der Stock&lt;br /&gt;
* Gaz Heyes&lt;br /&gt;
* Colin Watson&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* Cassio Goldschmidt&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP Mobile Security Project]]&lt;br /&gt;
* [[Cheat Sheets]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Access ==&lt;br /&gt;
&lt;br /&gt;
* Top 10 Proactive Controls 2018 PDF:  [[Media:OWASP_Top_10_Proactive_Controls_V3.pdf|EN]] | [[Media:OWASP_TOP_10_Proactive_Controls_2018_V3_PL.pdf|PL]]  | [[Media:Owasp-top-10-proactive-controls-2018-russian.pdf|Ru]]&lt;br /&gt;
&lt;br /&gt;
* Top 10 Proactive Controls 2018 [[Media:OWASP_Top_Ten_Proactive_Controls_v3.pptx|PPT Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2018 [[Media:OWASP_Top_10_Proactive_Controls_V3.docx|DOCX Download]]&lt;br /&gt;
* Mapping to other OWASP and IEEE Top 10 Lists [[Media:Owasp-pc-ieee-ott-omtt-ssdf.pdf|PDF Download]]&lt;br /&gt;
&lt;br /&gt;
== Translations ==&lt;br /&gt;
&lt;br /&gt;
* Top 10 Proactive Controls 2018 Chinese [[Media:OWASP_Top_10_Proactive_Controls_V3_Chinese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2018 Russian [[Media:Owasp-top-10-proactive-controls-2018-russian.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2018 Polish [[Media:OWASP_TOP_10_Proactive_Controls_2018_V3_PL.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Traditional Chinese Translation [[Media:OWASPTop10ProactiveControls2016-Chinese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Simplified Chinese Translation [[Media:OWASPTop10ProactiveControls2016-SimplifiedChinese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Japanese Translation [[Media:OWASPTop10ProactiveControls2016-Japanese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Hebrew Translation [[Media:OWASP_Proactive_Controls_2-Hebrew.pdf|PDF Download]]&lt;br /&gt;
&lt;br /&gt;
== Latest News and Events ==&lt;br /&gt;
* [Aug 2018] 3.0 Polish Translation Released!&lt;br /&gt;
* [May 2018] 3.0 Released!&lt;br /&gt;
* [June 2016] Featured in [http://www.booz-allen.co.in/content/dam/boozallen/documents/Viewpoints/2016/06/transformative-approach-to-secure-systems-delivery.pdf A Transformative Approach to Secure Systems Delivery]&lt;br /&gt;
* [June 2016] Featured in [http://www.oreilly.com/webops-perf/free/devopssec.csp DevOpsSec]&lt;br /&gt;
&lt;br /&gt;
Please see the  [{{SERVER}}/index.php/OWASP_Proactive_Controls?refresh=123#tab=News News] tab for more.&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* [{{SERVER}}/index.php/OWASP_Proactive_Controls_2014 Proactive Controls 2014]&lt;br /&gt;
* [{{SERVER}}/index.php/OWASP_Proactive_Controls_2016 Proactive Controls 2016]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
Keep up-to-date, participate or ask questions via the [https://lists.owasp.org/mailman/listinfo/owasp_proactive_controls Project Email List].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Proactive Controls 2018 =&lt;br /&gt;
&lt;br /&gt;
OWASP Proactive Controls 2018 is currently available in the following formats.  &lt;br /&gt;
* Top 10 Proactive Controls 2018 [{{SERVER}}/images/b/bc/OWASP_Top_10_Proactive_Controls_V3.pdf PDF version]&lt;br /&gt;
* Top 10 Proactive Controls 2018 [{{SERVER}}/images/1/13/OWASP_Top_Ten_Proactive_Controls_v3.pptx PPT download].&lt;br /&gt;
* Top 10 Proactive Controls 2018 [{{SERVER}}/images/7/79/OWASP_Top_10_Proactive_Controls_V3.docx DOCX download].&lt;br /&gt;
&lt;br /&gt;
Wiki version- is currently work in progress .&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* [ July 2019] Featured in Coursera course from UCDavies [https://www.coursera.org/directory/videos?courseId=V1k0pBtIEemZRAqH7m9oGA Identifying Security Vulnerabilities]&lt;br /&gt;
* [23 June 2019] Featured on HackerCombat: [https://hackercombat.com/implement-owasp-proactive-controls-to-work/ Implement OWASP Proactive Controls to Work]&lt;br /&gt;
* [7 June 2019] Feature on OWASP DevSlop Show [https://www.youtube.com/watch?v=Jdb3qweDc_Q  Proactive Controls]&lt;br /&gt;
* [15 May 2019] Featured in TechBeacon: [https://techbeacon.com/security/put-owasp-top-10-proactive-controls-work Put OWASP Top 10 Proactive Controls to work]&lt;br /&gt;
* [2 Mar 2019] Webinar: [https://www.youtube.com/watch?v=ldXe8f5yVq8 The OWASP Top Ten Proactive Controls with Jim Manico]&lt;br /&gt;
* [Dec 2018] Featured as the resource for Security “Shifting to the Left”!  in the  ISC2 course:  &amp;quot;DevSecOps: Integrating Security into DevOps”&lt;br /&gt;
* [20 Sep 2018 Featured in TechBeacon: [https://techbeacon.com/owasp-top-10-proactive-controls-2018-how-it-makes-your-code-more-secure OWASP Top 10 Proactive Controls 2018: How it makes your code more secure]&lt;br /&gt;
* [17 Sep 2018] Binary Blogger Podcast Episodes: [https://binaryblogger.com/2018/09/17/owasp-top-10-proactive-controls-podcast-episodes/ OWASP Top 10 Proactive Controls Podcast Episodes]&lt;br /&gt;
* [9 May 2018]  Featured in [https://techbeacon.com/developer-secure-code-starter-kit-resources Developer's security guide: 50 online resources to shift left]&lt;br /&gt;
* [7 May 2018] 3.0 released!&lt;br /&gt;
* [11 Aug 2017] Presented at  [https://northeastphp2017.sched.com/event/B6uo/owasp-top-10-proactive-controls-2016 Northeast PHP Conference]&lt;br /&gt;
* [25 July 2017] Podcast about at [https://www.appsecpodcast.org/2017/07/25/the-owasp-top-10-proactive-controls/ OWASP Top 10 Proactive Controls] &lt;br /&gt;
* [12 May 2017] Presented at [https://appseceurope2017.sched.com/event/A652/the-path-of-secure-software AppSec EU'17 - Belfast] &lt;br /&gt;
* [14 Feb 2017] Featured in [http://wwpi.com/2017/02/14/managing-cloud-infrastructure-to-prevent-security-gaps/ Managing Cloud Infrastructure to Prevent Security Gaps]&lt;br /&gt;
* [Feb 2017 ] Featured in &amp;quot;[http://assets.unisys.com/Documents/Global/POVPapers/POV_170062_ApplicationSecurityProgramProtectAgainstDataBreaches.pdf Application Security Program: Protect Against Data Breaches]&amp;quot;&lt;br /&gt;
* [ 1 Oct 2016] Presented at [http://conference.phpnw.org.uk/phpnw16/speakers/katy-anton/ PHPNW16]&lt;br /&gt;
* [5 July 2016] Featured in [https://www.thoughtworks.com/insights/blog/incorporating-security-best-practices-agile-teams Incorporating Security Best Practices into Agile Teams]&lt;br /&gt;
* [June 2016 ] Featured in [http://www.booz-allen.co.in/content/dam/boozallen/documents/Viewpoints/2016/06/transformative-approach-to-secure-systems-delivery.pdf A Transformative Approach to Secure Systems Delivery]&lt;br /&gt;
* [2 June 2016] Featured in [http://www.oreilly.com/webops-perf/free/devopssec.csp DevOpsSec - Securing Software through Continuous Delivery]&lt;br /&gt;
* [30 Apr 2016] Added Hebrew Translation for 2016 version&lt;br /&gt;
* [28 Apr 2016] Added Chinese Translations for 2016 version&lt;br /&gt;
* [12 Apr 2016] Added Hebrew translation for 2016 version&lt;br /&gt;
* [29 Feb 2016] Added [https://www.owasp.org/images/a/a8/OWASPTop10ProactiveControls2016-Japanese.pdf Japanese Translation]&lt;br /&gt;
* [14 Jan 2016] 2.0 released!&lt;br /&gt;
* [5 Dec 2015] Began final edit process for 2.0&lt;br /&gt;
* [29 Mar 2015] Added Hebrew Translation&lt;br /&gt;
* [27 Jan 2015] Added Top Ten Mapping&lt;br /&gt;
* [31 Oct 2014] Project presentation uploaded&lt;br /&gt;
* [10 Mar 2014] [http://lists.owasp.org/pipermail/owasp-leaders/2014-March/011047.html Request for review]&lt;br /&gt;
* [04 Feb 2014] New Wiki Template!&lt;br /&gt;
&lt;br /&gt;
= Users =&lt;br /&gt;
&lt;br /&gt;
* Michael Leung - Management consultant with Canadian Cybersecurity Inc.&lt;br /&gt;
: ''&amp;quot;Giving developers guidance that was practical was challenging. The OWASP Top 10 Proactive Controls helped a lot.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Disclaimer''' &lt;br /&gt;
&lt;br /&gt;
Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. &lt;br /&gt;
&lt;br /&gt;
'''How to get listed''' &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP Top 10 Proactive Controls. Include your name, organization's name, and brief description of how you use the project. The project lead can be reached  [mailto:katy.anton@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
= Formal Numbering =&lt;br /&gt;
&lt;br /&gt;
== 2018 Numbering ==&lt;br /&gt;
* OWASP-2018-C1: Define Security Requirements&lt;br /&gt;
* OWASP-2018-C2: Leverage Security Frameworks and Libraries &lt;br /&gt;
* OWASP-2018-C3: Secure Database Access&lt;br /&gt;
* OWASP-2018-C4: Encode and Escape Data&lt;br /&gt;
* OWASP-2018-C5: Validate All Inputs&lt;br /&gt;
* OWASP-2018-C6: Implement Digital Identity&lt;br /&gt;
* OWASP-2018-C7: Enforce Access Controls&lt;br /&gt;
* OWASP-2018-C8: Protect Data Everywhere&lt;br /&gt;
* OWASP-2018-C9: Implement Security Logging and Monitoring &lt;br /&gt;
* OWASP-2018-C10: Handle All Errors and Exceptions&lt;br /&gt;
&lt;br /&gt;
== 2016 Numbering ==&lt;br /&gt;
* OWASP-2016-C1: Verify for Security Early and Often&lt;br /&gt;
* OWASP-2016-C2: Parameterize Queries&lt;br /&gt;
* OWASP-2016-C3: Encode Data&lt;br /&gt;
* OWASP-2016-C4: Validate All Inputs &lt;br /&gt;
* OWASP-2016-C5: Implement Identity and Authentication Controls&lt;br /&gt;
* OWASP-2016-C6: Implement Appropriate Access Controls&lt;br /&gt;
* OWASP-2016-C7: Protect Data&lt;br /&gt;
* OWASP-2016-C8: Implement Logging and Intrusion Detection&lt;br /&gt;
* OWASP-2016-C9: Leverage Security Frameworks and Libraries&lt;br /&gt;
* OWASP-2016-C10: Error and Exception Handling&lt;br /&gt;
&lt;br /&gt;
== 2014 Numbering ==&lt;br /&gt;
* OWASP-2014-C1: Parameterize Queries&lt;br /&gt;
* OWASP-2014-C2: Encode Data&lt;br /&gt;
* OWASP-2014-C3: Validate All Inputs&lt;br /&gt;
* OWASP-2014-C4: Implement Appropriate Access Controls&lt;br /&gt;
* OWASP-2014-C5: Establish Identity and Authentication Controls&lt;br /&gt;
* OWASP-2014-C6: Protect Data and Privacy&lt;br /&gt;
* OWASP-2014-C7: Implement Logging, Error Handling and Intrusion Detection&lt;br /&gt;
* OWASP-2014-C8: Leverage Security Features of Frameworks and Security Libraries&lt;br /&gt;
* OWASP-2014-C9: Include Security-Specific Requirements&lt;br /&gt;
* OWASP-2014-C10: Design and Architect Security In&lt;br /&gt;
&lt;br /&gt;
= Translations = &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2018 Version ==&lt;br /&gt;
* Top 10 Proactive Controls 2018 Russian Translation: [[Media:Owasp-top-10-proactive-controls-2018-russian.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2018 Polish Translation:  [[Media:OWASP_TOP_10_Proactive_Controls_2018_V3_PL.pdf|PDF Download]]  &lt;br /&gt;
&lt;br /&gt;
== 2016 Version ==&lt;br /&gt;
* Top 10 Proactive Controls 2016 Traditional Chinese Translation [[Media:OWASPTop10ProactiveControls2016-Chinese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Simplified Chinese Translation [[Media:OWASPTop10ProactiveControls2016-SimplifiedChinese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Japanese Translation [[Media:OWASPTop10ProactiveControls2016-Japanese.pdf|PDF Download]]&lt;br /&gt;
* Top 10 Proactive Controls 2016 Hebrew Translation [[Media:OWASP_Proactive_Controls_2-Hebrew.pdf|PDF Download]]&lt;br /&gt;
&lt;br /&gt;
== 2014 Version ==&lt;br /&gt;
* Hebrew and French translations of the Top 10 Proactive Controls 2014 can be found on the 2014 archive tab.&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Top 10 Proactive Controls Project! &lt;br /&gt;
&lt;br /&gt;
== 2018 Roadmap ==&lt;br /&gt;
&lt;br /&gt;
* Create new PowerPoint and other artifacts for 2018 version (done)&lt;br /&gt;
* Create wiki for  2018 version (work in progress)&lt;br /&gt;
&lt;br /&gt;
== 2016 Roadmap ==&lt;br /&gt;
&lt;br /&gt;
* Create new PowerPoint and other artifacts for 2016 version (done)&lt;br /&gt;
* Proactive Control Mapping to Cheatsheet (done)&lt;br /&gt;
&lt;br /&gt;
== Status ==&lt;br /&gt;
&lt;br /&gt;
* February 21, 2014 Moved 2014 info to archive tab&lt;br /&gt;
* January 15, 2016: 2016 Proactive Controls Released!&lt;br /&gt;
* August 6, 2015: Kickoff for 2.0 effort, in progress&lt;br /&gt;
* March 10, 2014: We released an early beta of this document to the OWASP leaders list for review and commentary.&amp;lt;br /&amp;gt;&lt;br /&gt;
* February 3, 2014: We are currently working towards a beta release of this document and have begun working with a designer for the final release PDF.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|OWASP Proactive Controls]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_Proactive_Controls_V3_Chinese.pdf&amp;diff=256201</id>
		<title>File:OWASP Top 10 Proactive Controls V3 Chinese.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_Proactive_Controls_V3_Chinese.pdf&amp;diff=256201"/>
				<updated>2019-11-30T07:30:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=256193</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=256193"/>
				<updated>2019-11-28T07:20:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China Chapter Member  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-Mainland OWASP China Chapter] Vice Chairman (From 2017 till now)  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-Mainland OWASP China Chapter] Sichuan Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]&lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Co-Founder of SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，深圳开源互联网安全技术有限公司联合创始人，英国拉夫堡大学网络安全博士，PMP、ITIL、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国四川地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=253881</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=253881"/>
				<updated>2019-08-20T03:06:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
[[File:S-SDLC logo.png|alt= S-SDLC Project Logo|thumb|315x315px|S-SDLC Project Logo]] &lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 security incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* Silver Zhang&lt;br /&gt;
* Tianze Xia&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Yuezhong Bao (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Xuqin Li (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Zihuan(Jack) Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252124</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252124"/>
				<updated>2019-06-05T13:48:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My OWASP History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China Chapter Member  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-Mainland OWASP China Chapter] Vice Chairman (From 2017 till now)  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-Mainland OWASP China Chapter] Sichuan Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]&lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252123</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252123"/>
				<updated>2019-06-05T13:48:04Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My OWASP History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China Chapter Member  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-Mainland OWASP China Chapter] Vice Chairman (From 2017 till now)  &lt;br /&gt;
* [https://www.owasp.org/index.php/China-MainlandOWASP China Chapter] Sichuan Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]&lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252122</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=252122"/>
				<updated>2019-06-05T13:46:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My OWASP History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China Chapter Member  &lt;br /&gt;
* OWASP China Chapter Vice Chairman (From 2017 till now)  &lt;br /&gt;
* OWASP China Chapter Sichuan Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]&lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=252108</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=252108"/>
				<updated>2019-06-05T02:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
[[File:S-SDLC logo.png|alt= S-SDLC Project Logo|thumb|315x315px|S-SDLC Project Logo]] &lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 security incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Yuezhong Bao (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Xuqin Li (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Zihuan(Jack) Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=252107</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=252107"/>
				<updated>2019-06-05T02:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
[[File:S-SDLC logo.png|alt= S-SDLC Project Logo|thumb|315x315px|S-SDLC Project Logo]] &lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 security incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* XuQin Li (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Zihuan(Jack) Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=249383</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=249383"/>
				<updated>2019-03-28T09:29:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My Professional Background */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China-Mainland Chapter Member  &lt;br /&gt;
* OWASP China-Mainland Chapter Vice Chairman  &lt;br /&gt;
* OWASP China-Mainland Chapter Chengdu Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]    &lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=249382</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=249382"/>
				<updated>2019-03-28T09:27:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My Professional Background */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China-Mainland Chapter Member  &lt;br /&gt;
* OWASP China-Mainland Chapter Vice Chairman  &lt;br /&gt;
* OWASP China-Mainland Chapter Chengdu Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]    &lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、CISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248927</id>
		<title>Static Code Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248927"/>
				<updated>2019-03-18T07:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Commercial */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every '''[[control]]''' should follow this template.&lt;br /&gt;
&lt;br /&gt;
{{Template:Control}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a Code Review (also known as white-box testing) and is carried out at the Implementation phase of a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of Static Code Analysis tools that attempt to highlight possible vulnerabilities within 'static' (non-running) source code by using techniques such as Taint Analysis and Data Flow Analysis.&lt;br /&gt;
&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the Integrated Development Environment (IDE). For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
The UK Defense Standard 00-55 requires that Static Code Analysis be used on all 'safety related software in defense equipment'.&amp;lt;sup&amp;gt;[0]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
There are various techniques to analyze static source code for potential vulnerabilities that maybe combined into one solution. These techniques are often derived from compiler technologies.&lt;br /&gt;
&lt;br /&gt;
===Data Flow Analysis===&lt;br /&gt;
Data flow analysis is used to collect run-time (dynamic) information about data in software while it is in a static state (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
There are three common terms used in data flow analysis, basic block (the code), Control Flow Analysis (the flow of data) and Control Flow Path (the path the data takes):&lt;br /&gt;
&lt;br /&gt;
Basic block: A sequence of consecutive instructions where control enters at the beginning of a block, control leaves at the end of a block and the block cannot halt or branch out except at its end (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example PHP basic block:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. $a = 0;&lt;br /&gt;
2. $b = 1;&lt;br /&gt;
3. &lt;br /&gt;
4. if ($a == $b) &lt;br /&gt;
5. { # start of block&lt;br /&gt;
6.   echo “a and b are the same”;&lt;br /&gt;
7. } # end of block &lt;br /&gt;
8. else &lt;br /&gt;
9. { # start of block &lt;br /&gt;
10. echo “a and b are different”;&lt;br /&gt;
11.} # end of block&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Control Flow Graph (CFG) ===&lt;br /&gt;
An abstract graph representation of software by use of nodes that represent basic blocks. A node in a graph represents a block; directed edges are used to represent jumps (paths) from one block to another. If a node only has an exit edge, this is known as an ‘entry’ block, if a node only has a entry edge, this is know as an ‘exit’ block (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example Control Flow Graph; ‘node 1’ represents the entry block and ‘node 6’ represents the exit block.&lt;br /&gt;
&lt;br /&gt;
￼[[File:Control_flow_graph.png|400x200px]]&lt;br /&gt;
&lt;br /&gt;
===Taint Analysis===&lt;br /&gt;
Taint Analysis attempts to identify variables that have been 'tainted' with user controllable input and traces them to possible vulnerable functions also known as a 'sink'. If the tainted variable gets passed to a sink without first being sanitized it is flagged as a vulnerability.&lt;br /&gt;
&lt;br /&gt;
Some programming languages such as Perl and Ruby have Taint Checking built into them and enabled in certain situations such as accepting data via CGI.&lt;br /&gt;
&lt;br /&gt;
===Lexical Analysis===&lt;br /&gt;
Lexical Analysis converts source code syntax into ‘tokens’ of information in an attempt to abstract the source code and make it easier to manipulate (Sotirov, 2005).&lt;br /&gt;
&lt;br /&gt;
Pre tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?php $name = &amp;quot;Ryan&amp;quot;; ?&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Post tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
T_OPEN_TAG&lt;br /&gt;
T_VARIABLE&lt;br /&gt;
=&lt;br /&gt;
T_CONSTANT_ENCAPSED_STRING&lt;br /&gt;
;&lt;br /&gt;
T_CLOSE_TAG&lt;br /&gt;
 &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Limitations==&lt;br /&gt;
&lt;br /&gt;
===False Positives===&lt;br /&gt;
A static code analysis tool will often produce false positive results where the tool reports a possible vulnerability that in fact is not. This often occurs because the tool cannot be sure of the integrity and security of data as it flows through the application from input to output.&lt;br /&gt;
&lt;br /&gt;
False positive results might be reported when analysing an application that interacts with closed source components or external systems because without the source code it is impossible to trace the flow of data in the external system and hence ensure the integrity and security of the data.&lt;br /&gt;
&lt;br /&gt;
===False Negatives===&lt;br /&gt;
The use of static code analysis tools can also result in false negative results where vulnerabilities result but the tool does not report them. This might occur if a new vulnerability is discovered in an external component or if the analysis tool has no knowledge of the runtime environment and whether it is configured securely.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
* Types of Vulnerabilities it can detect (The OWASP Top Ten?) (more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
* Does it support Object-oriented programming (OOP)?&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===RIPS PHP Static Code Analysis Tool===&lt;br /&gt;
[[File:Rips.jpg|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
===OWASP LAPSE+ Static Code Analysis Tool===&lt;br /&gt;
[[File:LapsePlusScreenshot.png|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Tools===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Code_Crawler|OWASP Code Crawler]]&lt;br /&gt;
| .NET, Java&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP LAPSE Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP O2 Platform]]&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
| PHP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Open Source/Free ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! OS(es)&lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/agnitiotool/ Agnitio]&lt;br /&gt;
| ASP, ASP.NET, C#, Java, Javascript, Perl, PHP, Python, Ruby, VB.NET, XML&lt;br /&gt;
| Windows&lt;br /&gt;
|-&lt;br /&gt;
| [https://brakemanscanner.org/ Brakeman]&lt;br /&gt;
| Ruby, Rails&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity]&lt;br /&gt;
| Multiple&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.devbug.co.uk DevBug]&lt;br /&gt;
| PHP&lt;br /&gt;
| web-based&lt;br /&gt;
|-&lt;br /&gt;
| [http://findbugs.sourceforge.net/ FindBugs]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://find-sec-bugs.github.io/ Find Security Bugs]&lt;br /&gt;
| Java, Scala, Groovy&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://dwheeler.com/flawfinder/ FlawFinder]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/dotnet/netframework-3.0/bb429476(v=vs.80) Microsoft FxCop]&lt;br /&gt;
| .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://security-code-scan.github.io/ .NET Security Guard]&lt;br /&gt;
| .NET, C#, VB.net&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit]&lt;br /&gt;
| PHP&lt;br /&gt;
| Windows, Unix&lt;br /&gt;
|-&lt;br /&gt;
| [https://pmd.github.io/ PMD]&lt;br /&gt;
| Java, JavaScript, Salesforce.com Apex and Visualforce, PLSQL, Apache Velocity, XML, XSL&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pumascan.com/ Puma Scan]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/windows/embedded/ms933794(v=msdn.10) Microsoft PREFast]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
| PHP&lt;br /&gt;
| any&lt;br /&gt;
|-&lt;br /&gt;
| [https://sonarcloud.io/about SonarCloud]&lt;br /&gt;
| ABAP, C, C++, Objective-C, COBOL, C#, CSS, Flex, Go, HTML, Java, Javascript, Kotlin, PHP, PL/I, PL/SQL, Python, RPG, Ruby, Swift, T-SQL, TypeScript, VB6, VB, XML&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.splint.org/ Splint]&lt;br /&gt;
| C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper]&lt;br /&gt;
| C/C++, C#, VB, PHP, Java, PL/SQL&lt;br /&gt;
| Windows&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Commercial ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.microfocus.com/en-us/products/static-code-analysis-sast/overview Fortify]&lt;br /&gt;
| ABAP/BSP, ActionScript/MXML (Flex), ASP.NET, VB.NET, C# (.NET), C/C++, Classic ASP (w/VBScript), COBOL, ColdFusion CFML, HTML, Java (including Android), JavaScript/AJAX, JSP, Objective-C, PHP, PL/SQL, Python, T-SQL, Ruby, Swift, Visual Basic, VBScript, XML&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.veracode.com/ Veracode]&lt;br /&gt;
| Android, ASP.NET, C#, C, C++, Classic ASP, COBOL, ColdFusion/Java, Go, Groovy, iOS, Java, JavaScript, Perl, PhoneGap/Cordova, PHP, Python, React Native, RPG, Ruby on Rails, Scala, Titanium, TypeScript, VB.NET, Visual Basic 6, Xamarin&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.grammatech.com/ CodeSonar]&lt;br /&gt;
| C, C++, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.parasoft.com/ ParaSoft]&lt;br /&gt;
| C, C++, Java, .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.armorize.com/codesecure/ Armorize CodeSecure]&amp;lt;/s&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
| OWASP Member; acquired by Proofpoint in 2013&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.checkmarx.com/ Checkmarx Static Code Analysis]&lt;br /&gt;
| Android, Apex, ASP.NET, C#, C++, Go, Groovy, HTML5, Java, JavaScript, JSP, .NET, Objective-C, Perl, PHP, PL/SQL, Python, Ruby, Scala, Swift, TypeScript, VB.NET, Visual Basic 6, Windows Phone&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ibm.com/us-en/marketplace/ibm-appscan-source IBM AppScan Source]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html Coverity]&lt;br /&gt;
| Android, C#, C, C++, Java, JavaScript, Node.js, Objective-C, PHP, Python, Ruby, Scala, Swift, VB.NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.viva64.com/en/pvs-studio/ PVS-Studio]&lt;br /&gt;
| C, C++, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://pumascan.com/pricing/ Puma Scan Professional]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.roguewave.com/products-services/klocwork/static-code-analysis Klocwork]&lt;br /&gt;
| C, C++, C#, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.mathworks.com/products/polyspace.html Polyspace Static Analysis]&lt;br /&gt;
| C, C++, Ada&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ripstech.com/ RIPS NextGen]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.seczone.cn/2018/06/27/codesec%E6%BA%90%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E5%B9%B3%E5%8F%B0/ CodeSec]&lt;br /&gt;
| C, C++, C#, Java, JavaScript, PHP, Kotlin, Lua, Scala, TypeScript, Android&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Other Tool Lists===&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST - Source Code Security Analyzers]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis Wikipedia - List of tools for static code analysis]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[0] {{cite web |url=http://www.software-supportability.org/Docs/00-55_Part_2.pdf |title=Requirements for Safety Related Software in Defence Equipment |date=August 1, 1997 |format=pdf |publisher=Ministry of Defence |access-date=December 17, 2018}}&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf OWASP Code Review Guide v1.1]&lt;br /&gt;
* http://www.crosstalkonline.org/storage/issue-archives/2003/200311/200311-German.pdf&lt;br /&gt;
* http://www.ida.liu.se/~TDDC90/papers/industrial95.pdf&lt;br /&gt;
* http://www.php-security.org/downloads/rips.pdf&lt;br /&gt;
* http://www.seclab.tuwien.ac.at/papers/pixy.pdf&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|&lt;br /&gt;
In addition, one should classify control based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Control]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Control&lt;br /&gt;
Authorization Control&lt;br /&gt;
Authentication Control&lt;br /&gt;
Concurrency Control&lt;br /&gt;
Configuration Control&lt;br /&gt;
Cryptographic Control&lt;br /&gt;
Encoding Control&lt;br /&gt;
Error Handling Control&lt;br /&gt;
Input Validation Control&lt;br /&gt;
Logging and Auditing Control&lt;br /&gt;
Session Management Control&lt;br /&gt;
]]&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248926</id>
		<title>Static Code Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248926"/>
				<updated>2019-03-18T07:54:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Commercial */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every '''[[control]]''' should follow this template.&lt;br /&gt;
&lt;br /&gt;
{{Template:Control}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a Code Review (also known as white-box testing) and is carried out at the Implementation phase of a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of Static Code Analysis tools that attempt to highlight possible vulnerabilities within 'static' (non-running) source code by using techniques such as Taint Analysis and Data Flow Analysis.&lt;br /&gt;
&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the Integrated Development Environment (IDE). For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
The UK Defense Standard 00-55 requires that Static Code Analysis be used on all 'safety related software in defense equipment'.&amp;lt;sup&amp;gt;[0]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
There are various techniques to analyze static source code for potential vulnerabilities that maybe combined into one solution. These techniques are often derived from compiler technologies.&lt;br /&gt;
&lt;br /&gt;
===Data Flow Analysis===&lt;br /&gt;
Data flow analysis is used to collect run-time (dynamic) information about data in software while it is in a static state (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
There are three common terms used in data flow analysis, basic block (the code), Control Flow Analysis (the flow of data) and Control Flow Path (the path the data takes):&lt;br /&gt;
&lt;br /&gt;
Basic block: A sequence of consecutive instructions where control enters at the beginning of a block, control leaves at the end of a block and the block cannot halt or branch out except at its end (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example PHP basic block:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. $a = 0;&lt;br /&gt;
2. $b = 1;&lt;br /&gt;
3. &lt;br /&gt;
4. if ($a == $b) &lt;br /&gt;
5. { # start of block&lt;br /&gt;
6.   echo “a and b are the same”;&lt;br /&gt;
7. } # end of block &lt;br /&gt;
8. else &lt;br /&gt;
9. { # start of block &lt;br /&gt;
10. echo “a and b are different”;&lt;br /&gt;
11.} # end of block&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Control Flow Graph (CFG) ===&lt;br /&gt;
An abstract graph representation of software by use of nodes that represent basic blocks. A node in a graph represents a block; directed edges are used to represent jumps (paths) from one block to another. If a node only has an exit edge, this is known as an ‘entry’ block, if a node only has a entry edge, this is know as an ‘exit’ block (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example Control Flow Graph; ‘node 1’ represents the entry block and ‘node 6’ represents the exit block.&lt;br /&gt;
&lt;br /&gt;
￼[[File:Control_flow_graph.png|400x200px]]&lt;br /&gt;
&lt;br /&gt;
===Taint Analysis===&lt;br /&gt;
Taint Analysis attempts to identify variables that have been 'tainted' with user controllable input and traces them to possible vulnerable functions also known as a 'sink'. If the tainted variable gets passed to a sink without first being sanitized it is flagged as a vulnerability.&lt;br /&gt;
&lt;br /&gt;
Some programming languages such as Perl and Ruby have Taint Checking built into them and enabled in certain situations such as accepting data via CGI.&lt;br /&gt;
&lt;br /&gt;
===Lexical Analysis===&lt;br /&gt;
Lexical Analysis converts source code syntax into ‘tokens’ of information in an attempt to abstract the source code and make it easier to manipulate (Sotirov, 2005).&lt;br /&gt;
&lt;br /&gt;
Pre tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?php $name = &amp;quot;Ryan&amp;quot;; ?&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Post tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
T_OPEN_TAG&lt;br /&gt;
T_VARIABLE&lt;br /&gt;
=&lt;br /&gt;
T_CONSTANT_ENCAPSED_STRING&lt;br /&gt;
;&lt;br /&gt;
T_CLOSE_TAG&lt;br /&gt;
 &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Limitations==&lt;br /&gt;
&lt;br /&gt;
===False Positives===&lt;br /&gt;
A static code analysis tool will often produce false positive results where the tool reports a possible vulnerability that in fact is not. This often occurs because the tool cannot be sure of the integrity and security of data as it flows through the application from input to output.&lt;br /&gt;
&lt;br /&gt;
False positive results might be reported when analysing an application that interacts with closed source components or external systems because without the source code it is impossible to trace the flow of data in the external system and hence ensure the integrity and security of the data.&lt;br /&gt;
&lt;br /&gt;
===False Negatives===&lt;br /&gt;
The use of static code analysis tools can also result in false negative results where vulnerabilities result but the tool does not report them. This might occur if a new vulnerability is discovered in an external component or if the analysis tool has no knowledge of the runtime environment and whether it is configured securely.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
* Types of Vulnerabilities it can detect (The OWASP Top Ten?) (more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
* Does it support Object-oriented programming (OOP)?&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===RIPS PHP Static Code Analysis Tool===&lt;br /&gt;
[[File:Rips.jpg|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
===OWASP LAPSE+ Static Code Analysis Tool===&lt;br /&gt;
[[File:LapsePlusScreenshot.png|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Tools===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Code_Crawler|OWASP Code Crawler]]&lt;br /&gt;
| .NET, Java&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP LAPSE Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP O2 Platform]]&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
| PHP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Open Source/Free ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! OS(es)&lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/agnitiotool/ Agnitio]&lt;br /&gt;
| ASP, ASP.NET, C#, Java, Javascript, Perl, PHP, Python, Ruby, VB.NET, XML&lt;br /&gt;
| Windows&lt;br /&gt;
|-&lt;br /&gt;
| [https://brakemanscanner.org/ Brakeman]&lt;br /&gt;
| Ruby, Rails&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity]&lt;br /&gt;
| Multiple&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.devbug.co.uk DevBug]&lt;br /&gt;
| PHP&lt;br /&gt;
| web-based&lt;br /&gt;
|-&lt;br /&gt;
| [http://findbugs.sourceforge.net/ FindBugs]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://find-sec-bugs.github.io/ Find Security Bugs]&lt;br /&gt;
| Java, Scala, Groovy&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://dwheeler.com/flawfinder/ FlawFinder]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/dotnet/netframework-3.0/bb429476(v=vs.80) Microsoft FxCop]&lt;br /&gt;
| .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://security-code-scan.github.io/ .NET Security Guard]&lt;br /&gt;
| .NET, C#, VB.net&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit]&lt;br /&gt;
| PHP&lt;br /&gt;
| Windows, Unix&lt;br /&gt;
|-&lt;br /&gt;
| [https://pmd.github.io/ PMD]&lt;br /&gt;
| Java, JavaScript, Salesforce.com Apex and Visualforce, PLSQL, Apache Velocity, XML, XSL&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pumascan.com/ Puma Scan]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/windows/embedded/ms933794(v=msdn.10) Microsoft PREFast]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
| PHP&lt;br /&gt;
| any&lt;br /&gt;
|-&lt;br /&gt;
| [https://sonarcloud.io/about SonarCloud]&lt;br /&gt;
| ABAP, C, C++, Objective-C, COBOL, C#, CSS, Flex, Go, HTML, Java, Javascript, Kotlin, PHP, PL/I, PL/SQL, Python, RPG, Ruby, Swift, T-SQL, TypeScript, VB6, VB, XML&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.splint.org/ Splint]&lt;br /&gt;
| C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper]&lt;br /&gt;
| C/C++, C#, VB, PHP, Java, PL/SQL&lt;br /&gt;
| Windows&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Commercial ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.microfocus.com/en-us/products/static-code-analysis-sast/overview Fortify]&lt;br /&gt;
| ABAP/BSP, ActionScript/MXML (Flex), ASP.NET, VB.NET, C# (.NET), C/C++, Classic ASP (w/VBScript), COBOL, ColdFusion CFML, HTML, Java (including Android), JavaScript/AJAX, JSP, Objective-C, PHP, PL/SQL, Python, T-SQL, Ruby, Swift, Visual Basic, VBScript, XML&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.veracode.com/ Veracode]&lt;br /&gt;
| Android, ASP.NET, C#, C, C++, Classic ASP, COBOL, ColdFusion/Java, Go, Groovy, iOS, Java, JavaScript, Perl, PhoneGap/Cordova, PHP, Python, React Native, RPG, Ruby on Rails, Scala, Titanium, TypeScript, VB.NET, Visual Basic 6, Xamarin&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.grammatech.com/ CodeSonar]&lt;br /&gt;
| C, C++, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.parasoft.com/ ParaSoft]&lt;br /&gt;
| C, C++, Java, .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.armorize.com/codesecure/ Armorize CodeSecure]&amp;lt;/s&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
| OWASP Member; acquired by Proofpoint in 2013&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.checkmarx.com/ Checkmarx Static Code Analysis]&lt;br /&gt;
| Android, Apex, ASP.NET, C#, C++, Go, Groovy, HTML5, Java, JavaScript, JSP, .NET, Objective-C, Perl, PHP, PL/SQL, Python, Ruby, Scala, Swift, TypeScript, VB.NET, Visual Basic 6, Windows Phone&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ibm.com/us-en/marketplace/ibm-appscan-source IBM AppScan Source]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html Coverity]&lt;br /&gt;
| Android, C#, C, C++, Java, JavaScript, Node.js, Objective-C, PHP, Python, Ruby, Scala, Swift, VB.NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.viva64.com/en/pvs-studio/ PVS-Studio]&lt;br /&gt;
| C, C++, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://pumascan.com/pricing/ Puma Scan Professional]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.roguewave.com/products-services/klocwork/static-code-analysis Klocwork]&lt;br /&gt;
| C, C++, C#, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.mathworks.com/products/polyspace.html Polyspace Static Analysis]&lt;br /&gt;
| C, C++, Ada&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ripstech.com/ RIPS NextGen]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.seczone.cn/2018/06/27/codesec%E6%BA%90%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E5%B9%B3%E5%8F%B0/ CodeSec]&lt;br /&gt;
| Java, C/C++, C#, PHP, JavaScript, Kotlin, Lua, Scala, TypeScript, Android&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Other Tool Lists===&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST - Source Code Security Analyzers]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis Wikipedia - List of tools for static code analysis]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[0] {{cite web |url=http://www.software-supportability.org/Docs/00-55_Part_2.pdf |title=Requirements for Safety Related Software in Defence Equipment |date=August 1, 1997 |format=pdf |publisher=Ministry of Defence |access-date=December 17, 2018}}&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf OWASP Code Review Guide v1.1]&lt;br /&gt;
* http://www.crosstalkonline.org/storage/issue-archives/2003/200311/200311-German.pdf&lt;br /&gt;
* http://www.ida.liu.se/~TDDC90/papers/industrial95.pdf&lt;br /&gt;
* http://www.php-security.org/downloads/rips.pdf&lt;br /&gt;
* http://www.seclab.tuwien.ac.at/papers/pixy.pdf&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|&lt;br /&gt;
In addition, one should classify control based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Control]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Control&lt;br /&gt;
Authorization Control&lt;br /&gt;
Authentication Control&lt;br /&gt;
Concurrency Control&lt;br /&gt;
Configuration Control&lt;br /&gt;
Cryptographic Control&lt;br /&gt;
Encoding Control&lt;br /&gt;
Error Handling Control&lt;br /&gt;
Input Validation Control&lt;br /&gt;
Logging and Auditing Control&lt;br /&gt;
Session Management Control&lt;br /&gt;
]]&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248925</id>
		<title>Static Code Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248925"/>
				<updated>2019-03-18T07:48:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Commercial */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every '''[[control]]''' should follow this template.&lt;br /&gt;
&lt;br /&gt;
{{Template:Control}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a Code Review (also known as white-box testing) and is carried out at the Implementation phase of a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of Static Code Analysis tools that attempt to highlight possible vulnerabilities within 'static' (non-running) source code by using techniques such as Taint Analysis and Data Flow Analysis.&lt;br /&gt;
&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the Integrated Development Environment (IDE). For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
The UK Defense Standard 00-55 requires that Static Code Analysis be used on all 'safety related software in defense equipment'.&amp;lt;sup&amp;gt;[0]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
There are various techniques to analyze static source code for potential vulnerabilities that maybe combined into one solution. These techniques are often derived from compiler technologies.&lt;br /&gt;
&lt;br /&gt;
===Data Flow Analysis===&lt;br /&gt;
Data flow analysis is used to collect run-time (dynamic) information about data in software while it is in a static state (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
There are three common terms used in data flow analysis, basic block (the code), Control Flow Analysis (the flow of data) and Control Flow Path (the path the data takes):&lt;br /&gt;
&lt;br /&gt;
Basic block: A sequence of consecutive instructions where control enters at the beginning of a block, control leaves at the end of a block and the block cannot halt or branch out except at its end (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example PHP basic block:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. $a = 0;&lt;br /&gt;
2. $b = 1;&lt;br /&gt;
3. &lt;br /&gt;
4. if ($a == $b) &lt;br /&gt;
5. { # start of block&lt;br /&gt;
6.   echo “a and b are the same”;&lt;br /&gt;
7. } # end of block &lt;br /&gt;
8. else &lt;br /&gt;
9. { # start of block &lt;br /&gt;
10. echo “a and b are different”;&lt;br /&gt;
11.} # end of block&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Control Flow Graph (CFG) ===&lt;br /&gt;
An abstract graph representation of software by use of nodes that represent basic blocks. A node in a graph represents a block; directed edges are used to represent jumps (paths) from one block to another. If a node only has an exit edge, this is known as an ‘entry’ block, if a node only has a entry edge, this is know as an ‘exit’ block (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example Control Flow Graph; ‘node 1’ represents the entry block and ‘node 6’ represents the exit block.&lt;br /&gt;
&lt;br /&gt;
￼[[File:Control_flow_graph.png|400x200px]]&lt;br /&gt;
&lt;br /&gt;
===Taint Analysis===&lt;br /&gt;
Taint Analysis attempts to identify variables that have been 'tainted' with user controllable input and traces them to possible vulnerable functions also known as a 'sink'. If the tainted variable gets passed to a sink without first being sanitized it is flagged as a vulnerability.&lt;br /&gt;
&lt;br /&gt;
Some programming languages such as Perl and Ruby have Taint Checking built into them and enabled in certain situations such as accepting data via CGI.&lt;br /&gt;
&lt;br /&gt;
===Lexical Analysis===&lt;br /&gt;
Lexical Analysis converts source code syntax into ‘tokens’ of information in an attempt to abstract the source code and make it easier to manipulate (Sotirov, 2005).&lt;br /&gt;
&lt;br /&gt;
Pre tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?php $name = &amp;quot;Ryan&amp;quot;; ?&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Post tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
T_OPEN_TAG&lt;br /&gt;
T_VARIABLE&lt;br /&gt;
=&lt;br /&gt;
T_CONSTANT_ENCAPSED_STRING&lt;br /&gt;
;&lt;br /&gt;
T_CLOSE_TAG&lt;br /&gt;
 &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Limitations==&lt;br /&gt;
&lt;br /&gt;
===False Positives===&lt;br /&gt;
A static code analysis tool will often produce false positive results where the tool reports a possible vulnerability that in fact is not. This often occurs because the tool cannot be sure of the integrity and security of data as it flows through the application from input to output.&lt;br /&gt;
&lt;br /&gt;
False positive results might be reported when analysing an application that interacts with closed source components or external systems because without the source code it is impossible to trace the flow of data in the external system and hence ensure the integrity and security of the data.&lt;br /&gt;
&lt;br /&gt;
===False Negatives===&lt;br /&gt;
The use of static code analysis tools can also result in false negative results where vulnerabilities result but the tool does not report them. This might occur if a new vulnerability is discovered in an external component or if the analysis tool has no knowledge of the runtime environment and whether it is configured securely.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
* Types of Vulnerabilities it can detect (The OWASP Top Ten?) (more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
* Does it support Object-oriented programming (OOP)?&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===RIPS PHP Static Code Analysis Tool===&lt;br /&gt;
[[File:Rips.jpg|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
===OWASP LAPSE+ Static Code Analysis Tool===&lt;br /&gt;
[[File:LapsePlusScreenshot.png|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Tools===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Code_Crawler|OWASP Code Crawler]]&lt;br /&gt;
| .NET, Java&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP LAPSE Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP O2 Platform]]&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
| PHP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Open Source/Free ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! OS(es)&lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/agnitiotool/ Agnitio]&lt;br /&gt;
| ASP, ASP.NET, C#, Java, Javascript, Perl, PHP, Python, Ruby, VB.NET, XML&lt;br /&gt;
| Windows&lt;br /&gt;
|-&lt;br /&gt;
| [https://brakemanscanner.org/ Brakeman]&lt;br /&gt;
| Ruby, Rails&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity]&lt;br /&gt;
| Multiple&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.devbug.co.uk DevBug]&lt;br /&gt;
| PHP&lt;br /&gt;
| web-based&lt;br /&gt;
|-&lt;br /&gt;
| [http://findbugs.sourceforge.net/ FindBugs]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://find-sec-bugs.github.io/ Find Security Bugs]&lt;br /&gt;
| Java, Scala, Groovy&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://dwheeler.com/flawfinder/ FlawFinder]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/dotnet/netframework-3.0/bb429476(v=vs.80) Microsoft FxCop]&lt;br /&gt;
| .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://security-code-scan.github.io/ .NET Security Guard]&lt;br /&gt;
| .NET, C#, VB.net&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit]&lt;br /&gt;
| PHP&lt;br /&gt;
| Windows, Unix&lt;br /&gt;
|-&lt;br /&gt;
| [https://pmd.github.io/ PMD]&lt;br /&gt;
| Java, JavaScript, Salesforce.com Apex and Visualforce, PLSQL, Apache Velocity, XML, XSL&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pumascan.com/ Puma Scan]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/windows/embedded/ms933794(v=msdn.10) Microsoft PREFast]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
| PHP&lt;br /&gt;
| any&lt;br /&gt;
|-&lt;br /&gt;
| [https://sonarcloud.io/about SonarCloud]&lt;br /&gt;
| ABAP, C, C++, Objective-C, COBOL, C#, CSS, Flex, Go, HTML, Java, Javascript, Kotlin, PHP, PL/I, PL/SQL, Python, RPG, Ruby, Swift, T-SQL, TypeScript, VB6, VB, XML&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.splint.org/ Splint]&lt;br /&gt;
| C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper]&lt;br /&gt;
| C/C++, C#, VB, PHP, Java, PL/SQL&lt;br /&gt;
| Windows&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Commercial ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.microfocus.com/en-us/products/static-code-analysis-sast/overview Fortify]&lt;br /&gt;
| ABAP/BSP, ActionScript/MXML (Flex), ASP.NET, VB.NET, C# (.NET), C/C++, Classic ASP (w/VBScript), COBOL, ColdFusion CFML, HTML, Java (including Android), JavaScript/AJAX, JSP, Objective-C, PHP, PL/SQL, Python, T-SQL, Ruby, Swift, Visual Basic, VBScript, XML&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.veracode.com/ Veracode]&lt;br /&gt;
| Android, ASP.NET, C#, C, C++, Classic ASP, COBOL, ColdFusion/Java, Go, Groovy, iOS, Java, JavaScript, Perl, PhoneGap/Cordova, PHP, Python, React Native, RPG, Ruby on Rails, Scala, Titanium, TypeScript, VB.NET, Visual Basic 6, Xamarin&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.grammatech.com/ CodeSonar]&lt;br /&gt;
| C, C++, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.parasoft.com/ ParaSoft]&lt;br /&gt;
| C, C++, Java, .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.armorize.com/codesecure/ Armorize CodeSecure]&amp;lt;/s&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
| OWASP Member; acquired by Proofpoint in 2013&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.checkmarx.com/ Checkmarx Static Code Analysis]&lt;br /&gt;
| Android, Apex, ASP.NET, C#, C++, Go, Groovy, HTML5, Java, JavaScript, JSP, .NET, Objective-C, Perl, PHP, PL/SQL, Python, Ruby, Scala, Swift, TypeScript, VB.NET, Visual Basic 6, Windows Phone&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ibm.com/us-en/marketplace/ibm-appscan-source IBM AppScan Source]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html Coverity]&lt;br /&gt;
| Android, C#, C, C++, Java, JavaScript, Node.js, Objective-C, PHP, Python, Ruby, Scala, Swift, VB.NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.viva64.com/en/pvs-studio/ PVS-Studio]&lt;br /&gt;
| C, C++, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://pumascan.com/pricing/ Puma Scan Professional]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.roguewave.com/products-services/klocwork/static-code-analysis Klocwork]&lt;br /&gt;
| C, C++, C#, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.mathworks.com/products/polyspace.html Polyspace Static Analysis]&lt;br /&gt;
| C, C++, Ada&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ripstech.com/ RIPS NextGen]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.seczone.cn/2018/06/27/codesec%E6%BA%90%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E5%B9%B3%E5%8F%B0/ CodeSec]&lt;br /&gt;
| Java, C/C++, C#, PHP, JavaScript&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Other Tool Lists===&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST - Source Code Security Analyzers]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis Wikipedia - List of tools for static code analysis]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[0] {{cite web |url=http://www.software-supportability.org/Docs/00-55_Part_2.pdf |title=Requirements for Safety Related Software in Defence Equipment |date=August 1, 1997 |format=pdf |publisher=Ministry of Defence |access-date=December 17, 2018}}&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf OWASP Code Review Guide v1.1]&lt;br /&gt;
* http://www.crosstalkonline.org/storage/issue-archives/2003/200311/200311-German.pdf&lt;br /&gt;
* http://www.ida.liu.se/~TDDC90/papers/industrial95.pdf&lt;br /&gt;
* http://www.php-security.org/downloads/rips.pdf&lt;br /&gt;
* http://www.seclab.tuwien.ac.at/papers/pixy.pdf&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|&lt;br /&gt;
In addition, one should classify control based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Control]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Control&lt;br /&gt;
Authorization Control&lt;br /&gt;
Authentication Control&lt;br /&gt;
Concurrency Control&lt;br /&gt;
Configuration Control&lt;br /&gt;
Cryptographic Control&lt;br /&gt;
Encoding Control&lt;br /&gt;
Error Handling Control&lt;br /&gt;
Input Validation Control&lt;br /&gt;
Logging and Auditing Control&lt;br /&gt;
Session Management Control&lt;br /&gt;
]]&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248924</id>
		<title>Static Code Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Static_Code_Analysis&amp;diff=248924"/>
				<updated>2019-03-18T07:30:55Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* Commercial */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every '''[[control]]''' should follow this template.&lt;br /&gt;
&lt;br /&gt;
{{Template:Control}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a Code Review (also known as white-box testing) and is carried out at the Implementation phase of a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of Static Code Analysis tools that attempt to highlight possible vulnerabilities within 'static' (non-running) source code by using techniques such as Taint Analysis and Data Flow Analysis.&lt;br /&gt;
&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the Integrated Development Environment (IDE). For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
The UK Defense Standard 00-55 requires that Static Code Analysis be used on all 'safety related software in defense equipment'.&amp;lt;sup&amp;gt;[0]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
There are various techniques to analyze static source code for potential vulnerabilities that maybe combined into one solution. These techniques are often derived from compiler technologies.&lt;br /&gt;
&lt;br /&gt;
===Data Flow Analysis===&lt;br /&gt;
Data flow analysis is used to collect run-time (dynamic) information about data in software while it is in a static state (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
There are three common terms used in data flow analysis, basic block (the code), Control Flow Analysis (the flow of data) and Control Flow Path (the path the data takes):&lt;br /&gt;
&lt;br /&gt;
Basic block: A sequence of consecutive instructions where control enters at the beginning of a block, control leaves at the end of a block and the block cannot halt or branch out except at its end (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example PHP basic block:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. $a = 0;&lt;br /&gt;
2. $b = 1;&lt;br /&gt;
3. &lt;br /&gt;
4. if ($a == $b) &lt;br /&gt;
5. { # start of block&lt;br /&gt;
6.   echo “a and b are the same”;&lt;br /&gt;
7. } # end of block &lt;br /&gt;
8. else &lt;br /&gt;
9. { # start of block &lt;br /&gt;
10. echo “a and b are different”;&lt;br /&gt;
11.} # end of block&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Control Flow Graph (CFG) ===&lt;br /&gt;
An abstract graph representation of software by use of nodes that represent basic blocks. A node in a graph represents a block; directed edges are used to represent jumps (paths) from one block to another. If a node only has an exit edge, this is known as an ‘entry’ block, if a node only has a entry edge, this is know as an ‘exit’ block (Wögerer, 2005).&lt;br /&gt;
&lt;br /&gt;
Example Control Flow Graph; ‘node 1’ represents the entry block and ‘node 6’ represents the exit block.&lt;br /&gt;
&lt;br /&gt;
￼[[File:Control_flow_graph.png|400x200px]]&lt;br /&gt;
&lt;br /&gt;
===Taint Analysis===&lt;br /&gt;
Taint Analysis attempts to identify variables that have been 'tainted' with user controllable input and traces them to possible vulnerable functions also known as a 'sink'. If the tainted variable gets passed to a sink without first being sanitized it is flagged as a vulnerability.&lt;br /&gt;
&lt;br /&gt;
Some programming languages such as Perl and Ruby have Taint Checking built into them and enabled in certain situations such as accepting data via CGI.&lt;br /&gt;
&lt;br /&gt;
===Lexical Analysis===&lt;br /&gt;
Lexical Analysis converts source code syntax into ‘tokens’ of information in an attempt to abstract the source code and make it easier to manipulate (Sotirov, 2005).&lt;br /&gt;
&lt;br /&gt;
Pre tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?php $name = &amp;quot;Ryan&amp;quot;; ?&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Post tokenised PHP source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
T_OPEN_TAG&lt;br /&gt;
T_VARIABLE&lt;br /&gt;
=&lt;br /&gt;
T_CONSTANT_ENCAPSED_STRING&lt;br /&gt;
;&lt;br /&gt;
T_CLOSE_TAG&lt;br /&gt;
 &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Limitations==&lt;br /&gt;
&lt;br /&gt;
===False Positives===&lt;br /&gt;
A static code analysis tool will often produce false positive results where the tool reports a possible vulnerability that in fact is not. This often occurs because the tool cannot be sure of the integrity and security of data as it flows through the application from input to output.&lt;br /&gt;
&lt;br /&gt;
False positive results might be reported when analysing an application that interacts with closed source components or external systems because without the source code it is impossible to trace the flow of data in the external system and hence ensure the integrity and security of the data.&lt;br /&gt;
&lt;br /&gt;
===False Negatives===&lt;br /&gt;
The use of static code analysis tools can also result in false negative results where vulnerabilities result but the tool does not report them. This might occur if a new vulnerability is discovered in an external component or if the analysis tool has no knowledge of the runtime environment and whether it is configured securely.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
* Types of Vulnerabilities it can detect (The OWASP Top Ten?) (more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
* Does it support Object-oriented programming (OOP)?&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===RIPS PHP Static Code Analysis Tool===&lt;br /&gt;
[[File:Rips.jpg|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
===OWASP LAPSE+ Static Code Analysis Tool===&lt;br /&gt;
[[File:LapsePlusScreenshot.png|400px|thum|]]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Tools===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Code_Crawler|OWASP Code Crawler]]&lt;br /&gt;
| .NET, Java&lt;br /&gt;
|-&lt;br /&gt;
| [[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP LAPSE Project]]&lt;br /&gt;
| Java&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP O2 Platform]]&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
| PHP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Open Source/Free ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! OS(es)&lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/agnitiotool/ Agnitio]&lt;br /&gt;
| ASP, ASP.NET, C#, Java, Javascript, Perl, PHP, Python, Ruby, VB.NET, XML&lt;br /&gt;
| Windows&lt;br /&gt;
|-&lt;br /&gt;
| [https://brakemanscanner.org/ Brakeman]&lt;br /&gt;
| Ruby, Rails&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity]&lt;br /&gt;
| Multiple&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.devbug.co.uk DevBug]&lt;br /&gt;
| PHP&lt;br /&gt;
| web-based&lt;br /&gt;
|-&lt;br /&gt;
| [http://findbugs.sourceforge.net/ FindBugs]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://find-sec-bugs.github.io/ Find Security Bugs]&lt;br /&gt;
| Java, Scala, Groovy&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://dwheeler.com/flawfinder/ FlawFinder]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/dotnet/netframework-3.0/bb429476(v=vs.80) Microsoft FxCop]&lt;br /&gt;
| .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://security-code-scan.github.io/ .NET Security Guard]&lt;br /&gt;
| .NET, C#, VB.net&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit]&lt;br /&gt;
| PHP&lt;br /&gt;
| Windows, Unix&lt;br /&gt;
|-&lt;br /&gt;
| [https://pmd.github.io/ PMD]&lt;br /&gt;
| Java, JavaScript, Salesforce.com Apex and Visualforce, PLSQL, Apache Velocity, XML, XSL&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pumascan.com/ Puma Scan]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://docs.microsoft.com/en-us/previous-versions/windows/embedded/ms933794(v=msdn.10) Microsoft PREFast]&lt;br /&gt;
| C, C++&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
| PHP&lt;br /&gt;
| any&lt;br /&gt;
|-&lt;br /&gt;
| [https://sonarcloud.io/about SonarCloud]&lt;br /&gt;
| ABAP, C, C++, Objective-C, COBOL, C#, CSS, Flex, Go, HTML, Java, Javascript, Kotlin, PHP, PL/I, PL/SQL, Python, RPG, Ruby, Swift, T-SQL, TypeScript, VB6, VB, XML&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.splint.org/ Splint]&lt;br /&gt;
| C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper]&lt;br /&gt;
| C/C++, C#, VB, PHP, Java, PL/SQL&lt;br /&gt;
| Windows&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Commercial ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Software&lt;br /&gt;
! Language(s)&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.microfocus.com/en-us/products/static-code-analysis-sast/overview Fortify]&lt;br /&gt;
| ABAP/BSP, ActionScript/MXML (Flex), ASP.NET, VB.NET, C# (.NET), C/C++, Classic ASP (w/VBScript), COBOL, ColdFusion CFML, HTML, Java (including Android), JavaScript/AJAX, JSP, Objective-C, PHP, PL/SQL, Python, T-SQL, Ruby, Swift, Visual Basic, VBScript, XML&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.veracode.com/ Veracode]&lt;br /&gt;
| Android, ASP.NET, C#, C, C++, Classic ASP, COBOL, ColdFusion/Java, Go, Groovy, iOS, Java, JavaScript, Perl, PhoneGap/Cordova, PHP, Python, React Native, RPG, Ruby on Rails, Scala, Titanium, TypeScript, VB.NET, Visual Basic 6, Xamarin&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.grammatech.com/ CodeSonar]&lt;br /&gt;
| C, C++, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.parasoft.com/ ParaSoft]&lt;br /&gt;
| C, C++, Java, .NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.armorize.com/codesecure/ Armorize CodeSecure]&amp;lt;/s&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
| OWASP Member; acquired by Proofpoint in 2013&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.checkmarx.com/ Checkmarx Static Code Analysis]&lt;br /&gt;
| Android, Apex, ASP.NET, C#, C++, Go, Groovy, HTML5, Java, JavaScript, JSP, .NET, Objective-C, Perl, PHP, PL/SQL, Python, Ruby, Scala, Swift, TypeScript, VB.NET, Visual Basic 6, Windows Phone&lt;br /&gt;
| OWASP Member&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ibm.com/us-en/marketplace/ibm-appscan-source IBM AppScan Source]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html Coverity]&lt;br /&gt;
| Android, C#, C, C++, Java, JavaScript, Node.js, Objective-C, PHP, Python, Ruby, Scala, Swift, VB.NET&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.viva64.com/en/pvs-studio/ PVS-Studio]&lt;br /&gt;
| C, C++, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://pumascan.com/pricing/ Puma Scan Professional]&lt;br /&gt;
| .NET, C#&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.roguewave.com/products-services/klocwork/static-code-analysis Klocwork]&lt;br /&gt;
| C, C++, C#, Java&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.mathworks.com/products/polyspace.html Polyspace Static Analysis]&lt;br /&gt;
| C, C++, Ada&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.ripstech.com/ RIPS NextGen]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.seczone.cn/2018/06/27/codesec%E6%BA%90%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E5%B9%B3%E5%8F%B0/ CodeSec]&lt;br /&gt;
| Java, C/C++, C#, PHP, Kotlin, Scala, TypeScript, Lua&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Other Tool Lists===&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST - Source Code Security Analyzers]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis Wikipedia - List of tools for static code analysis]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[0] {{cite web |url=http://www.software-supportability.org/Docs/00-55_Part_2.pdf |title=Requirements for Safety Related Software in Defence Equipment |date=August 1, 1997 |format=pdf |publisher=Ministry of Defence |access-date=December 17, 2018}}&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf OWASP Code Review Guide v1.1]&lt;br /&gt;
* http://www.crosstalkonline.org/storage/issue-archives/2003/200311/200311-German.pdf&lt;br /&gt;
* http://www.ida.liu.se/~TDDC90/papers/industrial95.pdf&lt;br /&gt;
* http://www.php-security.org/downloads/rips.pdf&lt;br /&gt;
* http://www.seclab.tuwien.ac.at/papers/pixy.pdf&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|&lt;br /&gt;
In addition, one should classify control based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Control]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Control&lt;br /&gt;
Authorization Control&lt;br /&gt;
Authentication Control&lt;br /&gt;
Concurrency Control&lt;br /&gt;
Configuration Control&lt;br /&gt;
Cryptographic Control&lt;br /&gt;
Encoding Control&lt;br /&gt;
Error Handling Control&lt;br /&gt;
Input Validation Control&lt;br /&gt;
Logging and Auditing Control&lt;br /&gt;
Session Management Control&lt;br /&gt;
]]&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=247653</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=247653"/>
				<updated>2019-02-19T05:24:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Dr. Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:miya@owasp.org.cn 许飞]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246604</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246604"/>
				<updated>2019-01-16T03:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Dr. Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246603</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246603"/>
				<updated>2019-01-16T03:21:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''黑龙江：''' Huang Junqiang 黄俊强&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Dr. Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246602</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=246602"/>
				<updated>2019-01-16T03:08:48Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟，Wang Qinglong 王青龙&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
'''山西：''' Dr. Cao Xiaojun 曹晓俊&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=245834</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=245834"/>
				<updated>2018-12-07T03:59:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My Professional Background */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China-Mainland Chapter Member  &lt;br /&gt;
* OWASP China-Mainland Chapter Vice Chairman  &lt;br /&gt;
* OWASP China-Mainland Chapter Chengdu Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]    &lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle and Real-time Application Secure Prevention, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 3 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE, ACM and international conferences. His certifications include PMP, ITIL, Citrix, CWASP CSSP and ISO 27001.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、Citrix、ISO 27001认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著3本，申请发明专利2项，并为超过20个IEEE、ACM和其他国际学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=245833</id>
		<title>User:Jie Wang</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jie_Wang&amp;diff=245833"/>
				<updated>2018-12-07T03:56:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* My OWASP History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== My OWASP History ==&lt;br /&gt;
'''Roles'''&lt;br /&gt;
* OWASP and OWASP China-Mainland Chapter Member  &lt;br /&gt;
* OWASP China-Mainland Chapter Vice Chairman  &lt;br /&gt;
* OWASP China-Mainland Chapter Chengdu Section Leader  &lt;br /&gt;
'''Projects'''  &lt;br /&gt;
&lt;br /&gt;
[[OWASP Chinese Project|OWASP Chinese Project Lead]]&lt;br /&gt;
* [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010 OWASP Top 10]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf 2013 OWASP Top 10]&lt;br /&gt;
* [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017%EF%BC%88RC1%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88V1.0%EF%BC%89.pdf 2017 OWASP Top 10]&lt;br /&gt;
* OWASP Mobile Top 10&lt;br /&gt;
* [https://www.owasp.org/images/f/fd/SAMM-1.0-cn.pdf OWASP OpenSAMM]&lt;br /&gt;
* [https://www.owasp.org/images/7/73/OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* OWASP Code Review Guide&lt;br /&gt;
* OWASP Application Security Verification Standard Project&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project OWASP S-SDLC Project Member]    &lt;br /&gt;
&lt;br /&gt;
== My Professional Background ==  &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang received his Ph.D title in Electronic and Electrical Engineering Department in Lougborough University, UK, 2012. His research interests are Software Secure Development Lifecycle and Real-time Application Secure Prevention, Threat Analysis and Modelling, Network Intrusion Detection, Information Disclosure Prevention, Enterprise Informationization Construction Methodology, etc. He had published 16 academia research papers in various global conferences and journals and 2 translated book publications. He had applied 2 IPs in China, and taken the conference reviewer position for more than 20 IEEE conferences. His certifications include PMP, ITIL, Citrix and CWASP CSSP.    &lt;br /&gt;
&lt;br /&gt;
Dr. Jie Wang is a Vice President at SecZone, where he works to provide and optimize secure software development lifecycle assurance programs. Jie is responsible for the operations at SecZone's branding, training course and certify provision, industry benchmark and standard construction, academic cooperation, etc. Prior to SecZone, he was affiliated with China Petroleum Engineering Southwest Company as a core member for informationization business and information security, as well as an application security engineer at Newegg China for application security support.  &lt;br /&gt;
&lt;br /&gt;
王颉，英国拉夫堡大学网络安全博士，PMP、ITIL、Citrix认证专家、CWASP CSSP（注册软件安全专业人员）。主要研究方向包括：软件安全开发全生命周期实时检测防御、威胁分析与建模、网络入侵监测、敏感信息防扩散、企业信息化建设方法等。曾先后在国内外主流学术会议和核心期刊上发表论文16篇，出版联合译著2本，申请发明专利2项，并为超过20个IEEE学术会议担任论文审核专家。现任SecZone公司副总经理，全面负责SecZone的品牌运营、行业标准制定、校企合作等核心业务。曾任新蛋科技公司信息安全工程师、中国石油工程设计西南分公司信息化建设团队核心成员和信息安全工作负责人，先后主导和参与了超过50个信息安全课题和信息化建设项目，具有丰富的信息安全学术研究和资深的企业信息化建设实践经验。&lt;br /&gt;
&lt;br /&gt;
现任OWASP中国副主席、OWASP中国成都地区负责人。自2009年加入OWASP组织后，曾参与了“OWASP中文项目”和“OWASP S-SDLC项目”2个OWASP全球项目，并先后主持、参与和独立开展了“2010 OWASP Top 10”、“2013 OWASP Top 10”、“2017 OWASP Top 10”、“OWASP Mobile Top 10”、“OWASP OpenSAMM”、“OWASP安全编码规范快速参考指南”、 “OWASP Code Review”、“OWASP Application Security Verification Standard Project”等数10个OWASP中国分部项目，为在国内提高OWASP安全组织的影响力、提升OWASP研究成果的实用性和适用性做出重要贡献。&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245285</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245285"/>
				<updated>2018-11-20T08:59:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245284</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245284"/>
				<updated>2018-11-20T04:04:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng 刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao 黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun 任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi 沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu 栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing 刘锡明&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245283</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245283"/>
				<updated>2018-11-20T04:03:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席：''' [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉, Zhang Tao 张涛, [mailto:bao@owasp.org Yuezhong Bao] 包悦忠, &lt;br /&gt;
&lt;br /&gt;
'''秘书：''' [mailto:miya@owasp.org.cn Ms. Xu Fei] 许飞女士&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong 陈新龙&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord 张剑钟&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun] 王文君, Song Guohui 宋国徽&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Yuan Mingkun 袁明坤&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan 张龑&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]] 王颉&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Xia Tianze] 夏天泽 &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui 王厚奎&lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan 吴楠女士&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao 宋超&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国新预备区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''北京：''' Zhang Kun 张坤, Chen Shaoliang 陈绍良&lt;br /&gt;
&lt;br /&gt;
'''广东：''' Liu Zhicheng刘志城, Xiao Wenli 肖文棣&lt;br /&gt;
&lt;br /&gt;
'''海南：''' Wang Qiang 王强, Wei Deli 韦德理 &lt;br /&gt;
&lt;br /&gt;
'''吉林：''' Xian Shiqiang 咸士强&lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Huang Shenchao黄圣超, Zhao Yuehua 赵跃华&lt;br /&gt;
&lt;br /&gt;
'''陕西：''' Ren Bolun任博伦, Yang Lu 杨璐&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Shen Yi沈毅&lt;br /&gt;
&lt;br /&gt;
'''浙江：''' Li Yonghu栗永辉&lt;br /&gt;
&lt;br /&gt;
'''新疆：''' Liu Ximing刘锡明&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245277</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245277"/>
				<updated>2018-11-20T03:49:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席''': [[User:Jie Wang|Dr. Wang Jie]], Zhang Tao, [mailto:bao@owasp.org Yuezhong Bao], &lt;br /&gt;
&lt;br /&gt;
'''秘书''': [mailto:miya@owasp.org.cn Ms. Xu Fei]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun], Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Yuan Mingkun&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]]&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Tianze Xia] &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui &lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan &lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao &lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245239</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245239"/>
				<updated>2018-11-19T08:43:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席''': [[User:Jie Wang|Dr. Wang Jie]], Zhang Tao, [mailto:bao@owasp.org Yuezhong Bao], &lt;br /&gt;
&lt;br /&gt;
'''秘书''': [mailto:miya@owasp.org.cn Ms. Xu Fei]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun], Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]]&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Tianze Xia] &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui &lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan &lt;br /&gt;
&lt;br /&gt;
'''江苏：''' Song Chao &lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245238</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245238"/>
				<updated>2018-11-19T08:37:31Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: /* OWASP中国负责人 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''主席''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''副主席''': [[User:Jie Wang|Dr. Wang Jie]], Zhang Tao, [mailto:bao@owasp.org Yuezhong Bao], &lt;br /&gt;
&lt;br /&gt;
'''秘书''': [mailto:miya@owasp.org.cn Ms. Xu Fei]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun], Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]]&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Tianze Xia] &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui &lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan &lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245237</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=245237"/>
				<updated>2018-11-19T08:35:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide'''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''President''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': Zhang Tao  [mailto:bao@owasp.org Yuezhong Bao] [[User:Jie Wang|Wang Jie]] &lt;br /&gt;
&lt;br /&gt;
'''Secretary''': [mailto:miya@owasp.org.cn Ms. Xu Fei]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Xinlong&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' [mailto:shanda.wang@owasp.org.cn Wang Wenjun], Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun&lt;br /&gt;
&lt;br /&gt;
'''湖北：''' Zhang Yan&lt;br /&gt;
&lt;br /&gt;
'''四川：''' [[User:Jie Wang|Dr. Wang Jie]]&lt;br /&gt;
&lt;br /&gt;
'''安徽：''' [mailto:sky@owasp.org.cn Tianze Xia] &lt;br /&gt;
&lt;br /&gt;
'''广西：''' Wang Houkui &lt;br /&gt;
&lt;br /&gt;
'''辽宁：''' Ms. Wu Nan &lt;br /&gt;
&lt;br /&gt;
'''OWASP 中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''美国''' [mailto:helen.gao@owasp.org Helen Gao 高雯]&lt;br /&gt;
#'''美国''' [mailto:wzhong@gmail.com Weilin Zhong]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=244597</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=244597"/>
				<updated>2018-10-24T10:32:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
[[File:S-SDLC logo.png|alt= S-SDLC Project Logo|thumb|315x315px|S-SDLC Project Logo]] &lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:S-SDLC_logo.png&amp;diff=244596</id>
		<title>File:S-SDLC logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:S-SDLC_logo.png&amp;diff=244596"/>
				<updated>2018-10-24T10:30:17Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: Jie Wang uploaded a new version of File:S-SDLC logo.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:S-SDLC_logo.png&amp;diff=244595</id>
		<title>File:S-SDLC logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:S-SDLC_logo.png&amp;diff=244595"/>
				<updated>2018-10-24T10:30:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:%E5%AE%89%E5%85%A8%E6%84%8F%E8%AF%86Top_10%E9%A1%B9%E7%9B%AE2018_V1.0.pdf&amp;diff=242906</id>
		<title>File:安全意识Top 10项目2018 V1.0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:%E5%AE%89%E5%85%A8%E6%84%8F%E8%AF%86Top_10%E9%A1%B9%E7%9B%AE2018_V1.0.pdf&amp;diff=242906"/>
				<updated>2018-08-29T03:51:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: Jie Wang uploaded a new version of File:安全意识Top 10项目2018 V1.0.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;InfoSec Awareness Top 10 2018&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242905</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242905"/>
				<updated>2018-08-29T03:44:51Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242768</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242768"/>
				<updated>2018-08-23T06:03:41Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242767</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242767"/>
				<updated>2018-08-23T06:03:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=InfoSec Awareness Top 10=&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242766</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242766"/>
				<updated>2018-08-23T06:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=S-SDLC Practices  Top 10 =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242765</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242765"/>
				<updated>2018-08-23T05:58:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (Email:190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓（Email:190907765@qq.com）&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242764</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242764"/>
				<updated>2018-08-23T05:57:51Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
[[Media:安全意识Top 10项目2018 V1.0.pdf|《安全意识Top 10-2018》]]文档现已正式发布。&lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The Top 10 Awareness against Most Critical Public Information Security Threats shows as below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓(190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242762</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242762"/>
				<updated>2018-08-23T05:52:04Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:安全意识Top 10项目2018 V1.0.pdf| InfoSec Awareness Top 10 2018]] is now available. &lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The results of Top 10 cyber security incidents shows as below (detail information and English version will be updated)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓(190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:%E5%AE%89%E5%85%A8%E6%84%8F%E8%AF%86Top_10%E9%A1%B9%E7%9B%AE2018_V1.0.pdf&amp;diff=242761</id>
		<title>File:安全意识Top 10项目2018 V1.0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:%E5%AE%89%E5%85%A8%E6%84%8F%E8%AF%86Top_10%E9%A1%B9%E7%9B%AE2018_V1.0.pdf&amp;diff=242761"/>
				<updated>2018-08-23T05:50:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: InfoSec Awareness Top 10 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;InfoSec Awareness Top 10 2018&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242759</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242759"/>
				<updated>2018-08-23T05:46:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: Awareness Top 10 Publish&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
==InfoSec Awareness Top 10 2018 Released==&lt;br /&gt;
The [[Media:OWASP_Top_10-2017_(en).pdf.pdf| OWASP Top 10 - 2017]] is now available. &lt;br /&gt;
&lt;br /&gt;
==Top 10 Awareness for Most Critical Public Information Security Threats==&lt;br /&gt;
&lt;br /&gt;
This project is one of sub-projects for OWASP S-SDLC Project, aimed at the hot spot of the social public information security problems. By analyzing and proving the collected problems, we are endeavoring to arouse the basic information security awareness for public, and encouraging the general people could learn, understand and apply the foundamental information security controls by learning this Top 10 document. Ultimately, everyone is responsible for the infosec risk-free guarantee in the online society .&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Final Release==&lt;br /&gt;
&lt;br /&gt;
The results of Top 10 cyber security incidents shows as below (detail information and English version will be updated)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|计算机病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|木马事件 &lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|网络设备监视及窃听事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|网页内嵌恶意代码事件&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Team==&lt;br /&gt;
*'''Project Leader:''' Jack Ding (190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''Team Members:''' &lt;br /&gt;
&lt;br /&gt;
#'''SecZone:''' Chuanyong Cao, Xiangxi Chen, Fei Xu, [[User:Jie_Wang|Jie Wang]], Tianzhe Xia, Qingmign Zou&lt;br /&gt;
#'''Qingyuan Polytechnic College, Mentors:''' Hua Huang, Xiquan Guo, Bin Wang, Xianghui Chen, Zhicheng Liu&lt;br /&gt;
#'''Qingyuan Polytechnic College, Students:''' Kaitao Zhen, Junpeng Zou, Ronghua Chen, Haoliang Chen, Zijian Liu, Qiping Huang, Yuanhong Yu, Guanxiong Liang, Shaomo Huang, Junming Ma, Junjie Zou, Huixin Kong, Yaoguang He&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''项目牵头人：'''丁子桓(190907765@qq.com)&lt;br /&gt;
&lt;br /&gt;
*'''项目参与者：'''&lt;br /&gt;
&lt;br /&gt;
#'''SecZone互联网安全研究中心：'''曹传勇、陈香锡、许飞、[[User:Jie_Wang|王颉]]、夏天泽、邹庆明&lt;br /&gt;
#'''清远职业技术学院—指导教师：''' 黄华、郭锡泉、王斌、陈湘辉、刘志成&lt;br /&gt;
#'''清远职业技术学院—学生团队：'''郑楷涛、邹俊鹏、陈榕华、陈浩亮、刘梓健、黄绮萍、余远宏、王春前、梁冠雄、黄邵模、马俊明、邹俊杰、孔慧欣、何尧光&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Roadmap==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''August 20, 2018'''&lt;br /&gt;
'''2018年8月20日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''August 23, 2018'''&lt;br /&gt;
'''2018年8月23日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
InfoSec Awareness Top 10 2018 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
== Attachment: Data Classification Standard ==&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242317</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242317"/>
				<updated>2018-08-07T07:25:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
== Top Security Incidents ==&lt;br /&gt;
'''Project purpose / overview:''' &lt;br /&gt;
&lt;br /&gt;
This project is sub-project for OWASP S – SDLC Project, aimed at the hot spot in the social public security problem. Through the analysis of security problems, case demonstration, in order to arouse public awareness of the security, enhance people's consciousness of network safety as well as to understand and to grasp the method of network security. Finally, everybody is responsible for network security and good atmosphere of everyone involved.&lt;br /&gt;
&lt;br /&gt;
The scope of this project includes 1. Collect and sort public security issue around; 2. Output OWASP Security Awareness Top 10 Document; 3. Build an open source website platform to share information.&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
本项目范围包括1.收集整理分类公共安全事件；2.输出OWASP安全意识top10文档；3.搭建开源网站平台分享信息&lt;br /&gt;
&lt;br /&gt;
'''Project Roadmap:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''June 21, 2018'''&lt;br /&gt;
'''2018年6月21日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''June 25, 2018'''&lt;br /&gt;
'''2018年6月25日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Recently Update:'''&lt;br /&gt;
&lt;br /&gt;
The results of Top 10 cyber security incidents shows as below (detail information and English version will be updated)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击事件&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|信息系统软硬件自身故障事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|木马事件&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|干扰事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Project Leader name:'''&lt;br /&gt;
&lt;br /&gt;
Jack Ding&lt;br /&gt;
&lt;br /&gt;
'''Project Leader email address:'''&lt;br /&gt;
&lt;br /&gt;
 190907765@qq.com&lt;br /&gt;
&lt;br /&gt;
'''Team Member:'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Xia Tianzhe&lt;br /&gt;
&lt;br /&gt;
Zou Qingmign&lt;br /&gt;
&lt;br /&gt;
==== Attachment: Data Classification Standard ====&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the following contents are currently in Chinese only. &lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242316</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242316"/>
				<updated>2018-08-07T07:22:55Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
== Top Security Incidents ==&lt;br /&gt;
'''Project purpose / overview:''' &lt;br /&gt;
&lt;br /&gt;
This project is sub-project for OWASP S – SDLC Project, aimed at the hot spot in the social public security problem. Through the analysis of security problems, case demonstration, in order to arouse public awareness of the security, enhance people's consciousness of network safety as well as to understand and to grasp the method of network security. Finally, everybody is responsible for network security and good atmosphere of everyone involved.&lt;br /&gt;
&lt;br /&gt;
The scope of this project includes 1. Collect and sort public security issue around; 2. Output OWASP Security Awareness Top 10 Document; 3. Build an open source website platform to share information.&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
本项目范围包括1.收集整理分类公共安全事件；2.输出OWASP安全意识top10文档；3.搭建开源网站平台分享信息&lt;br /&gt;
&lt;br /&gt;
'''Project Roadmap:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''June 21, 2018'''&lt;br /&gt;
'''2018年6月21日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''June 25, 2018'''&lt;br /&gt;
'''2018年6月25日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Recently Update:'''&lt;br /&gt;
&lt;br /&gt;
The results of Top 10 cyber security incidents shows as below (detail information and English version will be updated)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击事件&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|信息系统软硬件自身故障事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|木马事件&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|干扰事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Project Leader name:'''&lt;br /&gt;
&lt;br /&gt;
Jack Ding&lt;br /&gt;
&lt;br /&gt;
'''Project Leader email address:'''&lt;br /&gt;
&lt;br /&gt;
 190907765@qq.com&lt;br /&gt;
&lt;br /&gt;
'''Team Member:'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Xia Tianzhe&lt;br /&gt;
&lt;br /&gt;
Zou Qingmign&lt;br /&gt;
&lt;br /&gt;
==== Attachment: Data Classification Standard ====&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Practices =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==1．企业必须自上而下推行S-SDLC实施，且有相应的组织结构支撑==&lt;br /&gt;
企业要实施S-SDLC，单靠传统的信息安全部门或几个网络安全人员是不行的，必须由公司领导层至上而下去推行。之所以必须是至上而下推行，一个重要的原因就是S-SDLC的实施并不是只有信息安全部门投入就可以了。S-SDLC会与研发部门的各个环境深度结合，需要研发部门的积极支持和全体参与。另外，安全对于大部分企业而言，能直接看到的是成本投入增加，而产出收益却是隐性的，并不会因为做了S-SDLC就能看到产品的直接销售收益。&lt;br /&gt;
&lt;br /&gt;
因此，不管是对于研发部门还是其他部门，都很难有主动实施S-SDLC的动力。微软在推行时，是由比尔.盖茨亲自发邮件要求员工停下手上所有的工作后才开始实施；而华为则是由CEO担任全球网络安全委员会主任来推行实施。也就是说，如果没有高层领导至上而下的要求，安全部门推行S-SDLC只会是一厢情愿。相信很多安全部门在推行S-SDLC时，都会遇到研发团队不配合而导致无法推行或推行效果不理想的情况。&lt;br /&gt;
&lt;br /&gt;
有了至上而下的要求，企业还要有相应的组织结构支撑，而合理的组织结构是保障S-SDLC实施效果的基础。因为S-SDLC在实施过程中会产生大量新的工作内容和新的工作流程，而这部分工作内容和工作职责混乱不清，将直接影响S-SDLC的执行效率和实施效果。&lt;br /&gt;
&lt;br /&gt;
==2．S-SDLC要与企业的质量管理体系相结合==&lt;br /&gt;
不少企业实施S-SDLC时，将S-SDLC作为一个独立的流程来操作。这使得企业需要投入大量额外资源来支撑S-SDLC整个流程的运转，且实施的质量得不到保障。因此，S-SDLC的实施效果往往达不到预期。&lt;br /&gt;
安全本质上是产品的一种质量属性。在质量管理领域，业界已有成熟的方法和流程，比如：ISO9001、CMM等级，这些都用来保障产品的质量。大部分企业都设置有质量部门，并设置有质量管理人员角色。但安全往往因为专业性强，缺乏成熟的管理方法和流程，再加上安全部门的存在，因此产品质量部门通常不关心产品的安全问题。&lt;br /&gt;
&lt;br /&gt;
在S-SDLC落地的过程中，将安全工程活动标准化，并纳入产品的质量体系，是保障S-SDLC实施效果的基础。举个例子来说，当产品的某项安全指标没有达到要求时，质量部门有权否决产品的上市发布或上线运营。&lt;br /&gt;
&lt;br /&gt;
==3．建立合适的人员培训体系==&lt;br /&gt;
在S-SDLC实施的过程中，安全不仅仅是软件安全专家的事，而是实施企业所有人的事。仅靠几个安全专家很难保证企业所有产品的安全质量，而信息安全部门或网络安全部门面对软件开发往往也力不从心。&lt;br /&gt;
S-SDLC虽然整体涉及软件产品的安全开发生命周期，偏重于方法和流程，但人的因素同样至关重要。对于同样的方法、同样的流程和同样的工具，如果实施人员的安全开发思想意识和技术能力不同，其产生的实施效果差异也会非常大。比如：某公司的安全部门要求所有口令都在hash后再存储，而开发人员就将口令设计成hash之后的结果，让人看了哭笑不得。&lt;br /&gt;
&lt;br /&gt;
如何让所有研发人员都了解并关注软件安全开发？建立一套合适的培训体系是较好的业界实践。这里的培训强调的是体系化的软件安全开发培训，而不是安全部门内部组织的信息安全知识培训或攻防渗透技术培训，因为对于不同的部门、不同的岗位、不同的人员，其安全的认知意识和技术能力也是不一样的。&lt;br /&gt;
简单来说，建议将安全培训分成不同的等级，且不同等级面向不同类型的人员群体。比如：软件安全开发意识培训可以面向所有人、软件安全编码培训可只面向开发和测试人员，而网络攻击技术培训可只面向安全专业人员。另外，需要让所有研发人员宏观的理解S-SDLC方法与流程，有助于让每个研发人员认知其与S-SDLC流程中上、下游角色的互动关系，也有助于让每个研发人员理解每一个S-SDLC的工作环节对整体产品安全的重要性。&lt;br /&gt;
&lt;br /&gt;
==4．用度量体系将S-SDLC实施效果可视化==&lt;br /&gt;
对于企业的研发高层领导来说，最关注的还是S-SDLC实施效果。如何让S-SDLC实施效果可视化，是S-SDLC实施过程中需要注意的重要问题。如果研发高层领导看不到S-SDLC的实施效果，那就意味着可能失去研发高层领导对S-SDLC实施的持续支持和资源投入，从而导致S-SDLC实施失败。&lt;br /&gt;
S-SDLC实施的效果本身就是隐性的。微软在这个问题上也没法给出立竿见影的效果，但今天Windows操作系统的安全性要比在S-SDLC实施前的Windows XP好多了，尽管今天的Windows操作系统还是有很多安全漏洞，但安全性的增强并不是简单地从漏洞数量上进行对比，而是漏洞发现的难度、漏洞利用的难度和漏洞被利用的影响都比之前有了明显的改善。&lt;br /&gt;
&lt;br /&gt;
因此，作为S-SDLC实施人员，需要在实施S-SDLC前给研发部门高层领导一个相对合理的预期：世界上没有100%的安全，不能保证S-SDLC实施后就不会再有漏洞了；也不是实施了S-SDLC后安全就可以高枕无忧了。但这也并不意味着就完全看不到效果。&lt;br /&gt;
如何让S-SDLC实施的效果可视化，比较好的做法是建立一套度量体系，通过度量的方法让S-SDLC实施的效果可视化出来。度量体系本身也是一套复杂的工程，比如说业界的OWASP SAMM和BSIMM就是复杂的评估度量体系。实施人员可以选取一些比较直观且容易实施的工程活动，体现工程能力的成熟度提升，这个和软件成熟度CMM类似。另外，也要有结果性的数据，比如：可以对测试发现的安全问题进行分级，建立一个S-SDLC实施前的基线，再看S-SDLC实施后每一年的问题发展趋势。&lt;br /&gt;
&lt;br /&gt;
==5．产品的安全目标决定S-SDLC的过程==&lt;br /&gt;
完整的S-SDLC包含众多的活动，而同样的活动在不同企业的投入弹性空间也非常大，以威胁建模为例，有的产品可能只花半天时间，而有的产品可能需要花一个月甚至更长时间。&lt;br /&gt;
在S-SDLC实施的过程中遇到过很多类似问题：这个活动需不需要做？这个活动需要做到什么程度？这个活动需求投入多少人？对于这些问题，并没有统一的答案。因为不同的产品所处的环境不一样，面临的风险也不一样。但我们可以给出基本的判断原则。&lt;br /&gt;
这些原则的基本出发点就是产品的安全目标是什么？安全目标说起来容易，但要说清楚，就不是一件容易的事了。很多专业的安全人员往往更多的考虑安全技术，而忽略了安全目标。技术应该是用来支撑目标的达成，所以当目标不清楚的情况下，很难判断一项技术的使用是否合理？这些技术是否足够？这就导致了很多企业当前的一个现象：安全的投入好像是一个无底洞，不知道什么时候才能做完。这显然不是企业领导者所要的结果。&lt;br /&gt;
&lt;br /&gt;
因此，在实施S-SDLC的过程中，定义一个清晰的安全目标，才能使S-SDLC的实施过程更加科学合理。&lt;br /&gt;
&lt;br /&gt;
==6．威胁模型可以使产品避免大的设计风险==&lt;br /&gt;
如果问S-SDLC实施过程中有什么过程是特别难的，OWASP S-SDLC项目组相信很多真正实施过的企业或专家都会将这一票投给威胁建模。因为威胁建模做得太浅则感觉没什么效果；而做的太深则导致实施难度和投入成本的增加。如何取得深浅之度的平衡是威胁建模的难点所在。&lt;br /&gt;
要解决这个问题，还得从威胁建模的本质说起。威胁建模的本质是建立产品的威胁模型。而需要通过威胁建模达到什么样的目的，不少安全人员的理解也不太一样。&lt;br /&gt;
&lt;br /&gt;
根据OWASP S-SDLC项目组的实践经验，一方面希望专业的安全人员通过威胁建模发现更多、更深入的产品设计漏洞，以呈现威胁建模的效果；另一方面又希望这一过程能工具化，使普通的研发人员也能发现同样的问题。但通常实际的效果是：经验丰富的安全人员不通过威胁建模的方法就能发现该问题；而普通的研发人员即使用了威胁建模的方法，也发现不了该问题。&lt;br /&gt;
&lt;br /&gt;
对于这一现象，并不是威胁建模本身出了问题，而是企业对威胁建模的使用以及目标预期出了问题，威胁模型的核心作用是通过模型化的方式来管理威胁、风险和对应的缓解措施。威胁、风险、缓解措施这三者相辅相成，S-SDLC中STRIDE威胁建模方法可以将大颗粒度的威胁结构化，从而避免了产品威胁模型遗漏了大颗粒度的威胁，保证了威胁的完整性；有了威胁就会有风险，有风险就需要根据风险来设计相应的缓解措施；这就是威胁建模的核心价值。而发现设计漏洞，实际上就是发现某个威胁没有相应的缓解措施或是缓解措施的设计BUG可以被绕过。&lt;br /&gt;
&lt;br /&gt;
这里还有一点值得注意，就是所有的缓解措施都不能100%的缓解风险，缓解措施的目的是通过合适的成本将风险降低到一个可接受的范围内。&lt;br /&gt;
&lt;br /&gt;
==7．安全特性组件化可尽量避免编码漏洞==&lt;br /&gt;
代码漏洞对于软件来说几乎是不可避免的，据数据统计，代码量与漏洞成正比。即便最早提出和实施方法论的微软，也不能保证代码百分之百没有漏洞。&lt;br /&gt;
&lt;br /&gt;
漏洞问题对产品来说是最直观的（可直接利用），也是最头痛的（消灭不了）；代码漏洞也是S-SDLC需要重点解决的问题。目前多数也认识到这一问题，并选择使用代码扫描工具，例如SAST和DAST等，但这类工具存在致命的缺陷：误报和漏报。误报过多造成大量研发资源的浪费，而漏报过多又会使得工具的应用效果大打折扣。代码扫描工具的漏报和误报是必然存在的，S-SDLC中也有如何降低漏洞和误报的实践，但这更多需要依赖于新型的安全检测工具去解决。&lt;br /&gt;
&lt;br /&gt;
从S-SDLC的整体视角上看，扫描工具只能发现部分已存在的代码漏洞，并不能减少代码漏洞的产生，属于“后端被动式”的解决思路。S-SDLC更关注如何减少代码漏洞的产生，也就是如何从“前端”主动解决问题。一个比较好的实践就是将产品中的安全特性组件化，比如：密码算法模块、认证授权模块，这些模块都是重要的缓解措施实现，一旦出问题就导致缓解措施被绕过的漏洞。因此，将这些模块组件化，让不同的产品在这些领域都使用公共组件，而不用自己开发，自然也就不会引入漏洞；而这些公共的组件则由安全专业团队重点保障。在微软，为了避免参数校验问题导致和缓冲区溢出问题，由专业的安全团队重写了经常导致漏洞的函数（如：memcpy、strcpy）,并由一系列自身带有安全校验的函数来代替。这一措施使得产品在很大程度上解决了缓冲区溢出的问题（虽不能全部解决，但效果显而易而，且投入成本不高）。&lt;br /&gt;
&lt;br /&gt;
==8．管理第三方软件的风险==&lt;br /&gt;
不论是传统的软件企业还是新型的互联网企业，在软件开发的过程中都免不了要使用第三方组件。第三方组件既包含开源软件，也包含商业软件。而且随着软件越复杂，第三方软件的使用数量也越来越多。从安全的角度看，第三方软件也是一个重要的风险源（比如，前两年OpenSSL的漏洞集中暴发）。第三方软件不仅是产品集成的组件，开发环境中所用到的工具也要作为第三方软件来对待（XcodeGhost事件大家应该都还记得）。&lt;br /&gt;
&lt;br /&gt;
第三方软件与自主研发的软件不一样。S-SDLC的方法和流程没法覆盖开源社区和第三方厂商。那么如何管理第三方软件的风险，也是S-SDLC实施过程中面临的一个主要的问题。具体来说，有以下实践供大家参考：&lt;br /&gt;
（1）企业要有清单列表记录哪些产品使用了哪些第三方软件。一旦某个第三方软件出现漏洞，可以通过清单列表迅速排查。&lt;br /&gt;
（2）企业要有清单列表记录禁用的第三方软件。对于那些安全问题比较多、风险较大的第三软件，应加入到这个禁用清单列表中禁止使用。&lt;br /&gt;
（3）对于使用较多且开源的第三方组件，建议进行代码扫描，对于发现的漏洞，提交开源社区，并促使开源社区修复。&lt;br /&gt;
（4）对于第三方软件的使用要有安全性指导（主要是规避一些因配置不当引入的安全问题）。&lt;br /&gt;
（5）慎用对安全问题处理态度消极的厂商所开发的第三方软件。&lt;br /&gt;
&lt;br /&gt;
==9．安全服务化和自动化是实施DevSecOps的基础==&lt;br /&gt;
近年来，DevOps的开发模式已被广泛应用。DevOps的核心思想是将开发和运维一体化，开发能快速推出产品进行AB测试，通过数个版本的迭代，使产品变得成熟稳定，同时也使产品功能变得丰富。&lt;br /&gt;
在DevOps开发模式下，传统的S-SDLC流程在DevOps模式下显得过于厚重，那么就需要有适用于DevOps流程的S-SDLC，这就是DevSecOps的由来。由于运维流程也一体化了，因此在传统S-SDLC的安全成本模型也就发生了变化。举个例子来说，在传统S-SDLC的测试过程中，我们要尽可能的发现所有的安全漏洞，因为产品一旦发布，漏洞的修复成本会很高；但在互联网企业自己开发、自己测试、自己运维的DevOps模式下，产品发布后，漏洞修复的成本并不一定有增加很多。因为运维一体化后，漏洞一旦发现，响应的时间可控制在一个很短的时间内。&lt;br /&gt;
但这并不是说DevOps之后开发过程中的安全活动就不需要做了，只是做的方式会有差异。这个差异主要来自于安全功能的服务化、自动化工具。安全功能服务化本身符合SOA架构和微服务架构的演进方向。安全功能服务化后，就能将产品的一些安全风险转移到安全服务上。以IAM服务为例，采用成熟的IAM服务能在很大程度上降低产品在认证和授权方面的问题。AWS提供的移动应用账号服务可以让移动应用直接集成，而不用担心账号的安全问题；或是采用OAuth认证方式，采用安全性很强的Google、QQ、微信等知名厂商的安全认证对接。这样自然就减少了产品研发过程中的安全投入，使S-SDLC可以变得快起来。另一方面，采用工具实现自动化，也在很大程度上能减少S-SDLC过程的投入。&lt;br /&gt;
&lt;br /&gt;
==10．S-SDLC工具链==&lt;br /&gt;
无论在普通开发、敏捷开发还是DevSecOps模式下，S-SDLC落地的关键都离不开流程体系和高度自动化工具链的融合。根据OWASP S-SDLC项目团队的实践积累，若有一个一体化的平台能准确、完整地记录、管理和追踪软件产品在S-SDLC实施过程中的实际情况，实现软件产品开发信息在S-SDLC流程中跨活动、跨角色流动，才能真正确保软件产品的安全需求和安全威胁在开发、测试和部署运维过程中落地。而无论是需求阶段的需求库、开发与测试的安全测试工具，还是其他安全工具，都将成为S-SDLC工具链中的一环。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242315</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=242315"/>
				<updated>2018-08-07T07:08:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
== Top Security Incidents ==&lt;br /&gt;
'''Project purpose / overview:''' &lt;br /&gt;
&lt;br /&gt;
This project is sub-project for OWASP S – SDLC Project, aimed at the hot spot in the social public security problem. Through the analysis of security problems, case demonstration, in order to arouse public awareness of the security, enhance people's consciousness of network safety as well as to understand and to grasp the method of network security. Finally, everybody is responsible for network security and good atmosphere of everyone involved.&lt;br /&gt;
&lt;br /&gt;
The scope of this project includes 1. Collect and sort public security issue around; 2. Output OWASP Security Awareness Top 10 Document; 3. Build an open source website platform to share information.&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
本项目范围包括1.收集整理分类公共安全事件；2.输出OWASP安全意识top10文档；3.搭建开源网站平台分享信息&lt;br /&gt;
&lt;br /&gt;
'''Project Roadmap:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''June 21, 2018'''&lt;br /&gt;
'''2018年6月21日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''June 25, 2018'''&lt;br /&gt;
'''2018年6月25日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Recently Update:'''&lt;br /&gt;
&lt;br /&gt;
The results of Top 10 cyber security incidents shows as below (detail information and English version will be updated)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|1&lt;br /&gt;
|利用漏洞攻击事件&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|信息泄漏事件&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|信息系统软硬件自身故障事件&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|病毒事件&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|信息篡改事件&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|木马事件&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|钓鱼事件&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|电信诈骗&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|干扰事件&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|信息丢失事件&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Project Leader name:'''&lt;br /&gt;
&lt;br /&gt;
Jack Ding&lt;br /&gt;
&lt;br /&gt;
'''Project Leader email address:'''&lt;br /&gt;
&lt;br /&gt;
 190907765@qq.com&lt;br /&gt;
&lt;br /&gt;
'''Team Member:'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Xia Tianzhe&lt;br /&gt;
&lt;br /&gt;
Zou Qingmign&lt;br /&gt;
&lt;br /&gt;
==== Attachment: Data Classification Standard ====&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
=Top 10 Practices=&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=241260</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=241260"/>
				<updated>2018-06-12T06:19:44Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
== Top Security Incidents ==&lt;br /&gt;
'''Project purpose / overview:''' &lt;br /&gt;
&lt;br /&gt;
This project is sub-project for OWASP S – SDLC Project, aimed at the hot spot in the social public security problem. Through the analysis of security problems, case demonstration, in order to arouse public awareness of the security, enhance people's consciousness of network safety as well as to understand and to grasp the method of network security. Finally, everybody is responsible for network security and good atmosphere of everyone involved.&lt;br /&gt;
&lt;br /&gt;
The scope of this project includes 1. Collect and sort public security issue around; 2. Output OWASP Security Awareness Top 10 Document; 3. Build an open source website platform to share information.&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
本项目范围包括1.收集整理分类公共安全事件；2.输出OWASP安全意识top10文档；3.搭建开源网站平台分享信息&lt;br /&gt;
&lt;br /&gt;
'''Project Roadmap:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''June 21, 2018'''&lt;br /&gt;
'''2018年6月21日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''June 25, 2018'''&lt;br /&gt;
'''2018年6月25日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Project Leader name:'''&lt;br /&gt;
&lt;br /&gt;
Jack Ding&lt;br /&gt;
&lt;br /&gt;
'''Project Leader email address:'''&lt;br /&gt;
&lt;br /&gt;
 190907765@qq.com&lt;br /&gt;
&lt;br /&gt;
'''Team Member:'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Xia Tianzhe&lt;br /&gt;
&lt;br /&gt;
Zou Qingmign&lt;br /&gt;
&lt;br /&gt;
==== Attachment: Data Classification Standard ====&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=241259</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=241259"/>
				<updated>2018-06-12T04:16:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jie Wang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
&lt;br /&gt;
(4) Top 10 secrutiy incidents of years for awareness training&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
&lt;br /&gt;
Creditease,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
&lt;br /&gt;
(5)The &amp;quot;Insight&amp;quot; Platform&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
&lt;br /&gt;
[https://github.com/creditease-sec/insight Insight Platform]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project materials are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project materials are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Jie_Wang Wang Jie] (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web applicationBelow table shows the recent updates of the project.Below tables shows recent updateBelow table shows recent updates.s. servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
* '''&amp;quot;INSIGHT&amp;quot; Platform'''&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; is a management platform developed by the Security Department of CreditEase which integrates Application system asset, Vulnerability lifecycle, and Security knowledge base.&lt;br /&gt;
# Application System Asset Management: managing assets of application system in the company, including system name, domain, senior level, department, and owner.&lt;br /&gt;
# Vulnerability Lifecycle Management: proceeding online submission, notification, verification, retesting, classification, risk calculation, repair deadline calculation, email reminder, and vulnerability data analysis for the security vulnerability found from application system in the company.&lt;br /&gt;
# Security Knowledge Management: implementing centralized storage, online learning, security training, and knowledge inherited of security knowledge and standard specification.&lt;br /&gt;
&amp;quot;INSIGHT&amp;quot; was developed by Python language and form of Flask framework &amp;amp; MySQL &amp;amp; Docker container.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/creditease-sec/insight github].&lt;br /&gt;
&lt;br /&gt;
'''The concept of design'''&lt;br /&gt;
&lt;br /&gt;
Application security activities begin with the risk assessment of the application assets. When the company accumulates more assets, it shall encounter increasing problems, such as unclear assets resource, miss of asset owner, the high cost of continuous of vulnerability tracking and difficulty of security knowledge penetrating, no data support for high-frequency risks, and failure of solving core problems, In addition, risk quantification is also a problem.&lt;br /&gt;
&lt;br /&gt;
[[File:Insight1.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
In the design of application security management framework, the general process of risk governance is as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Insight2.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
Based on the demands of the above risk governance, “INSIGHT&amp;quot; came into being.&lt;br /&gt;
&lt;br /&gt;
'''Highlights'''&lt;br /&gt;
&lt;br /&gt;
After the implement of &amp;quot;INSIGHT&amp;quot; system, we achieved the following goals. Please see the following picture:&lt;br /&gt;
&lt;br /&gt;
Vulnerability history at a glance&lt;br /&gt;
[[File:Insight3.png|thumb|none]]&lt;br /&gt;
Vulnerability tracking is methodical&lt;br /&gt;
[[File:Insight4.png|thumb|none]]&lt;br /&gt;
Learning Cases can be found easily&lt;br /&gt;
[[File:Insight5.png|thumb|none]]&lt;br /&gt;
Safety requirements are precisely controlled&lt;br /&gt;
[[File:Insight6.png|thumb|none]]&lt;br /&gt;
Threats and risks are well-founded&lt;br /&gt;
[[File:Insight7.png|thumb|none]]&lt;br /&gt;
Quantitative figures are known in real time&lt;br /&gt;
[[File:Insight8.png|thumb|none]]&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sub-Projects =&lt;br /&gt;
&lt;br /&gt;
== Top Security Incidents ==&lt;br /&gt;
'''Project purpose / overview:''' &lt;br /&gt;
&lt;br /&gt;
This project is sub-project for OWASP S – SDLC Project, aimed at the hot spot in the social public security problem. Through the analysis of security problems, case demonstration, in order to arouse public awareness of the security, enhance people's consciousness of network safety as well as to understand and to grasp the method of network security. Finally, everybody is responsible for network security and good atmosphere of everyone involved.&lt;br /&gt;
&lt;br /&gt;
The scope of this project includes 1. Collect and sort public security issue around; 2. Output OWASP Security Awareness Top 10 Document; 3. Build an open source website platform to share information.&lt;br /&gt;
&lt;br /&gt;
本项目为OWASP S-SDLC子项目， 旨在针对社会公众关注的热点安全问题，通过对安全问题的分析、案例演示，唤起公众对安全的关注，提升人民群众网络安全意识，了解和掌握网络安全防范方法，营造网络安全人人有责、人人参与的良好氛围。&lt;br /&gt;
&lt;br /&gt;
本项目范围包括1.收集整理分类公共安全事件；2.输出OWASP安全意识top10文档；3.搭建开源网站平台分享信息&lt;br /&gt;
&lt;br /&gt;
'''Project Roadmap:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!'''Phase'''&lt;br /&gt;
!'''Date'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web site technology solutions'''&lt;br /&gt;
'''网站技术方案'''&lt;br /&gt;
|'''June 13- June 23, 2018'''&lt;br /&gt;
'''2018年6月13日-6月23日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data Classification Standard'''&lt;br /&gt;
'''数据分类标准'''&lt;br /&gt;
|'''May25- June1, 2018'''&lt;br /&gt;
'''2018年5月25日-6月1日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 1'''&lt;br /&gt;
'''手动收集整理分类数据阶段1'''&lt;br /&gt;
|'''June 2- June10, 2018'''&lt;br /&gt;
'''2018年6月2日-6月10日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Data collection 2'''&lt;br /&gt;
'''手动收集整理分类数据阶段2'''&lt;br /&gt;
|'''June 11- June15, 2018'''&lt;br /&gt;
'''2018年6月11日-6月15日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Review categories and Website debugging'''&lt;br /&gt;
'''评审类别和网站调试'''&lt;br /&gt;
|'''June 11- June20, 2018'''&lt;br /&gt;
'''2018年6月11日-6月24日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Output-Secure Awareness TOP 10 Document'''&lt;br /&gt;
'''安全意识TOP 10文档'''&lt;br /&gt;
|'''June 21, 2018'''&lt;br /&gt;
'''2018年6月21日'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Web Site on line'''&lt;br /&gt;
'''网站上线'''&lt;br /&gt;
|'''June 25, 2018'''&lt;br /&gt;
'''2018年6月25日'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Project Leader name:'''&lt;br /&gt;
&lt;br /&gt;
Jack Ding&lt;br /&gt;
&lt;br /&gt;
'''Project Leader email address:'''&lt;br /&gt;
&lt;br /&gt;
 190907765@qq.com&lt;br /&gt;
&lt;br /&gt;
'''Team Member:'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Xia Tianzhe&lt;br /&gt;
&lt;br /&gt;
Zou Qingmign&lt;br /&gt;
&lt;br /&gt;
==== Attachment: Data Classification Standard ====&lt;br /&gt;
(Will provide English Version Later)&lt;br /&gt;
[[File:Category.png|center|thumb]]&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
= Recent Updates =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Main Section&lt;br /&gt;
!Chapter&lt;br /&gt;
!Status&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Preface&lt;br /&gt;
|Purpose of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Coverage of S-SDLC&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Strategy&lt;br /&gt;
|Security Strategy&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Security Goal&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; |The infrastructure of security engineering capability&lt;br /&gt;
|A Brief Overview of the Infrastructure &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|Organization Structures&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Flow Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Security Tech Framework&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Chain of Tools&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Training System&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The Measurement System &lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Security Requirements&lt;br /&gt;
|To Understand Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|How to build Security Requirements&lt;br /&gt;
|Done. Waiting for approve&lt;br /&gt;
|-&lt;br /&gt;
|The interpretation of OWASP Top10 Project for training purpose&lt;br /&gt;
|Detailed explanations of the top 10(e.g. Demo) &lt;br /&gt;
|Calling for volunteers&lt;br /&gt;
|-&lt;br /&gt;
|TBD...&lt;br /&gt;
|TBD...&lt;br /&gt;
|&lt;br /&gt;
|}&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Jie Wang</name></author>	</entry>

	</feed>