<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luisenriquez</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luisenriquez"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Luisenriquez"/>
		<updated>2026-04-28T21:40:43Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Luisenriquez&amp;diff=252055</id>
		<title>User:Luisenriquez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Luisenriquez&amp;diff=252055"/>
				<updated>2019-06-03T10:34:36Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''EDUCATION'''&lt;br /&gt;
- PHD (c)in cybersecurity and law - Univerité de Lille (France)&lt;br /&gt;
- LLM in Information Technology Law, Leibniz Universität Hannover (Germany)&lt;br /&gt;
- CEH, CHFI, ECSA, CIH (Ec Council certifications)&lt;br /&gt;
- HD Data Recovery Expert (Ace Labs - Russia)&lt;br /&gt;
- SONOLOGY AND ALGORITHM COMPOSITION, Institute of Sonology ( The&lt;br /&gt;
Netherlands), 2003 – 2005.&lt;br /&gt;
&lt;br /&gt;
'''PROFESSIONAL PROFILE'''&lt;br /&gt;
&lt;br /&gt;
- Expert in GDPR compliance. &lt;br /&gt;
&lt;br /&gt;
- GDPR metrics. &lt;br /&gt;
&lt;br /&gt;
- Lawyer specialized in Copyrights, Copylefts, FOSS licenses(GPL, LGPL, Apache, Mozilla, BSD,&lt;br /&gt;
MIT), E-discovery, Data Protection, Data Security, Privacy, and all issues related to the Internet and new technologies.&lt;br /&gt;
&lt;br /&gt;
- IT security expert : Ethical Hacker, Pen Tester, Digital Forensics Examiner, and Data Recovery expert.&lt;br /&gt;
&lt;br /&gt;
- Programmer with high level in C, C++ and Python.&lt;br /&gt;
&lt;br /&gt;
- Ethical Hacking and Digital Forensics teacher : Université de Lille.&lt;br /&gt;
- Cybercrime teacher : Universidad Andina Simón Bolívar.&lt;br /&gt;
- Digital Forensics teacher: Universidad UTE.&lt;br /&gt;
- Data protection teacher: Foundation pour le droit continental - Université de Paris 2.&lt;br /&gt;
- Electronic voting teacher: IAEN.&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252054</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252054"/>
				<updated>2019-06-03T10:28:19Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications.&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:There are 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is based on the OWASP Application Security Verification Standard(ASVS). Web applications will get a rating based on the Applications Security Verification levels on the AVSV standard(cursory, standard, opportunistic, and advanced).&lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden backdoors, and non-transparent policies. This label will require a Privacy scanning policy that may be based on the OWASP Top Ten Privacy project. Web applications must follow ethical principles of data processing and data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is only possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, APIs, and so on. This label is about Web Applications exposing all their ingredients, including third party code and dependencies.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This label consists on a scanning policy based on the OWASP Top Ten project, and making the scan visible. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in June - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered into the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) in a visible place within your Web application, copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling system requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, Web service providers assume a direct compromise with their users. &lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project has been relaunched. We are examining with a new team the possibilities of a joint venture for complying the new legal regulations such as GDPR in the summer of 2019.  &lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS SECURITY PROJECT'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses on your web applications in a visible place. You could also add them into your license contracts, terms of services or privacy policies. If your software is licensed under the terms of a generic-purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and mantainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This Web application  discloses a list of all its components and third party code, including source code, plug-ins, shared libraries. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THE WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: It is based on trust and reputation.&lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: Web Applications must be developed and maintained with a security orientation. &lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Users have the right to know if web applications are secure enough. This is the main purpose of OWASP. Currently we propose using the AVSV standard as it provides a basis for testing web application technical security controls. &lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: Surveillance code, misuse of personal data, and non-transparent policies are as dangerous as code vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
:  Users have the right to know how their information is processed and stored. We propose developing a privacy scan policy based on the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, and shared libraries.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to rate security. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Vulnerabilities such as XSS scripting and SQL injection must be efficiently fixed.&lt;br /&gt;
: Scan policies must be based on the OWASP Top ten Project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a logo and a declaration. The logo must be visible within the web application, and linked to the declaration and reports stored on the OWASP security labeling system records. The declaration may also be included within the web application, or as part of IT contracts, copyright licenses(additional terms for public licenses), terms of service, or privacy policies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled web applications. '''WE ARE HERE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''OPENNESS LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Get into the testing program.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the documents to other languages.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */'''''&lt;br /&gt;
&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */'''''&lt;br /&gt;
&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:''&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and maintainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THIS WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252053</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252053"/>
				<updated>2019-06-03T10:19:48Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications.&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:There are 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is based on the OWASP Application Security Verification Standard(AVSV). Web applications will get a rating based on the Applications Security Verification levels on the AVSV standard(cursory, standard, opportunistic, and advanced).&lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden backdoors, and non-transparent policies. This label will require a Privacy scanning policy that may be based on the OWASP Top Ten Privacy project. Web applications must follow ethical principles of data processing and data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is only possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, APIs, and so on. This label is about Web Applications exposing all their ingredients, including third party code and dependencies.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This label consists on a scanning policy based on the OWASP Top Ten project, and making the scan visible. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in June - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered into the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) in a visible place within your Web application, copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling system requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, Web service providers assume a direct compromise with their users. &lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project has been relaunched. We are examining with a new team the possibilities of a joint venture for complying the new legal regulations such as GDPR in the summer of 2019.  &lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS SECURITY PROJECT'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses on your web applications in a visible place. You could also add them into your license contracts, terms of services or privacy policies. If your software is licensed under the terms of a generic-purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and mantainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This Web application  discloses a list of all its components and third party code, including source code, plug-ins, shared libraries. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THE WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: It is based on trust and reputation.&lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: Web Applications must be developed and maintained with a security orientation. &lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Users have the right to know if web applications are secure enough. This is the main purpose of OWASP. Currently we propose using the AVSV standard as it provides a basis for testing web application technical security controls. &lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: Surveillance code, misuse of personal data, and non-transparent policies are as dangerous as code vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
:  Users have the right to know how their information is processed and stored. We propose developing a privacy scan policy based on the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, and shared libraries.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to rate security. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Vulnerabilities such as XSS scripting and SQL injection must be efficiently fixed.&lt;br /&gt;
: Scan policies must be based on the OWASP Top ten Project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a logo and a declaration. The logo must be visible within the web application, and linked to the declaration and reports stored on the OWASP security labeling system records. The declaration may also be included within the web application, or as part of IT contracts, copyright licenses(additional terms for public licenses), terms of service, or privacy policies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled web applications. '''WE ARE HERE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''OPENNESS LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Get into the testing program.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the documents to other languages.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */'''''&lt;br /&gt;
&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */'''''&lt;br /&gt;
&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:''&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and maintainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THIS WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252052</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=252052"/>
				<updated>2019-06-03T10:17:05Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* MOTIVATION */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications.&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:There are 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is based on the OWASP Application Security Verification Standard(AVSV). Web applications will get a rating based on the Applications Security Verification levels on the AVSV standard(cursory, standard, opportunistic, and advanced).&lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden backdoors, and non-transparent policies. This label will require a Privacy scanning policy that may be based on the OWASP Top Ten Privacy project. Web applications must follow ethical principles of data processing and data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is only possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, APIs, and so on. This label is about Web Applications exposing all their ingredients, including third party code and dependencies.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This label consists on a scanning policy based on the OWASP Top Ten project, and making the scan visible. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in June - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered into the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) in a visible place within your Web application, copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling system requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, Web service providers assume a direct compromise with their users. &lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is being FIXED. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Openness label''' in June - 2015.&lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS SECURITY PROJECT'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses on your web applications in a visible place. You could also add them into your license contracts, terms of services or privacy policies. If your software is licensed under the terms of a generic-purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and mantainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This Web application  discloses a list of all its components and third party code, including source code, plug-ins, shared libraries. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THE WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: It is based on trust and reputation.&lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: Web Applications must be developed and maintained with a security orientation. &lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Users have the right to know if web applications are secure enough. This is the main purpose of OWASP. Currently we propose using the AVSV standard as it provides a basis for testing web application technical security controls. &lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: Surveillance code, misuse of personal data, and non-transparent policies are as dangerous as code vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
:  Users have the right to know how their information is processed and stored. We propose developing a privacy scan policy based on the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, and shared libraries.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to rate security. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Vulnerabilities such as XSS scripting and SQL injection must be efficiently fixed.&lt;br /&gt;
: Scan policies must be based on the OWASP Top ten Project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a logo and a declaration. The logo must be visible within the web application, and linked to the declaration and reports stored on the OWASP security labeling system records. The declaration may also be included within the web application, or as part of IT contracts, copyright licenses(additional terms for public licenses), terms of service, or privacy policies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled web applications. '''WE ARE HERE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''OPENNESS LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Get into the testing program.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the documents to other languages.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */'''''&lt;br /&gt;
&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */'''''&lt;br /&gt;
&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:''&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and maintainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THIS WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221820</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221820"/>
				<updated>2016-09-26T23:00:55Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Our first KBAPMP draft is finished. It is temporary hosted at github: [https://github.com/luisenriquez/kbapmp  KBAPMP_DRAFT]. We are building a dynamic KBA sandbox for testing purposes. We need contributors.&lt;br /&gt;
&lt;br /&gt;
KBAPMP Archive: Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NNI (NIST NSTIC IDESG) Initiative: https://www.owasp.org/index.php/OWASP_NNI_Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:bev.corwin@owasp.org Bev Corwin]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
&lt;br /&gt;
We will be presenting the KBAPMP standard at the OWASP APP SEC USA 2016 in Washington between October 11th and October 14th. For more information about the OWASP APP Sec USA 2016, please visit this link: [https://2016.appsecusa.org/ USA_APPSEC_2016]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== September 23, 2016 ==&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics Project (KBA-PMP) will be at AppSecUSA in Washington DC USA, October 11-14, 2016 for the OWASP Project Summit, for details see https://2016.appsecusa.org ==&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin &amp;lt;br&amp;gt;&lt;br /&gt;
Noreen Whysel &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221819</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221819"/>
				<updated>2016-09-26T23:00:22Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Our first KBAPMP draft is finished. It is temporary hosted at github: [https://github.com/luisenriquez/kbapmp  KBAPMP_DRAFT]. We are building a dynamic KBA sandbox for testing purposes. We need contributors.&lt;br /&gt;
&lt;br /&gt;
KBAPMP Archive: Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NNI (NIST NSTIC IDESG) Initiative: https://www.owasp.org/index.php/OWASP_NNI_Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:bev.corwin@owasp.org Bev Corwin]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== September 23, 2016 ==&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics Project (KBA-PMP) will be at AppSecUSA in Washington DC USA, October 11-14, 2016 for the OWASP Project Summit, for details see https://2016.appsecusa.org ==&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin &amp;lt;br&amp;gt;&lt;br /&gt;
Noreen Whysel &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221818</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221818"/>
				<updated>2016-09-26T22:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Our first KBAPMP draft is finished. It is temporary hosted at github: [https://github.com/luisenriquez/kbapmp  KBAPMP_DRAFT]. We ae building a dynamic KBA sandbox for testing purposes. We need contributors.&lt;br /&gt;
&lt;br /&gt;
We will be presenting the KBAPMP standard at the OWASP APP SEC USA 2016 in Washington between October 11th and October 14th. For more information about the OWASP APP Sec USA 2016, please visit this link: [https://2016.appsecusa.org/ USA_APPSEC_2016]&lt;br /&gt;
&lt;br /&gt;
KBAPMP Archive: Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NNI (NIST NSTIC IDESG) Initiative: https://www.owasp.org/index.php/OWASP_NNI_Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:bev.corwin@owasp.org Bev Corwin]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== September 23, 2016 ==&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics Project (KBA-PMP) will be at AppSecUSA in Washington DC USA, October 11-14, 2016 for the OWASP Project Summit, for details see https://2016.appsecusa.org ==&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin &amp;lt;br&amp;gt;&lt;br /&gt;
Noreen Whysel &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221817</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=221817"/>
				<updated>2016-09-26T22:56:54Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Our first KBAPMP draft is finished. It is temporary hosted at github: [https://github.com/luisenriquez/kbapmp  KBAPMP_DRAFT]&lt;br /&gt;
We will be presenting the KBAPMP standard at the OWASP APP SEC USA 2016 in Washington between October 11th and October 14th. For more information about the OWASP APP Sec USA 2016, please visit this link: [https://2016.appsecusa.org/ USA_APPSEC_2016]&lt;br /&gt;
&lt;br /&gt;
KBAPMP Archive: Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NNI (NIST NSTIC IDESG) Initiative: https://www.owasp.org/index.php/OWASP_NNI_Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:bev.corwin@owasp.org Bev Corwin]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== September 23, 2016 ==&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics Project (KBA-PMP) will be at AppSecUSA in Washington DC USA, October 11-14, 2016 for the OWASP Project Summit, for details see https://2016.appsecusa.org ==&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin &amp;lt;br&amp;gt;&lt;br /&gt;
Noreen Whysel &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215757</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215757"/>
				<updated>2016-04-21T12:43:28Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215756</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215756"/>
				<updated>2016-04-21T12:40:05Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Standard DRAFT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/luisenriquez/kbapmp KBAPMP] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215755</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215755"/>
				<updated>2016-04-21T12:38:55Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Standard DRAFT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp KBAPMP] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215754</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215754"/>
				<updated>2016-04-21T12:35:00Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Standard DRAFT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[KBAPMP draft]]&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215753</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215753"/>
				<updated>2016-04-21T12:33:16Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Standard DRAFT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp click-here]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215749</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215749"/>
				<updated>2016-04-21T09:30:43Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Standard DRAFT */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp click-here]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215748</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215748"/>
				<updated>2016-04-21T09:28:14Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Current Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215747</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215747"/>
				<updated>2016-04-21T09:25:14Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* April 20, 2016 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github. We are closing our Second Phase. Now is time to Debug and test.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215746</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215746"/>
				<updated>2016-04-21T09:23:47Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* May 19-20, 2015 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== April 20, 2016 ==&lt;br /&gt;
&lt;br /&gt;
First draft is released on github.&lt;br /&gt;
&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215745</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215745"/>
				<updated>2016-04-21T09:21:23Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez &amp;lt;br&amp;gt;&lt;br /&gt;
Robert Faron &amp;lt;br&amp;gt;&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215744</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215744"/>
				<updated>2016-04-21T09:20:55Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
Robert Faron&lt;br /&gt;
Bev Corwin&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215743</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215743"/>
				<updated>2016-04-21T09:19:12Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* KBA-PMP Project Metrics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- [https://github.com/luisenriquez/kbapmp]&lt;br /&gt;
We are working on a ruby based performance metrics demo for the KBA-PMP standard--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215742</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=215742"/>
				<updated>2016-04-21T09:15:58Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication, following a transnational perspective. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- In this project, we are focused on Dynamic KBA. However the methodology described here can also be suitable for static KBA. Data is such a broad category. We live in the Big Data era, and information is gold. Today, KBA service providers can get data sources from public records, social networks, and many others. Tose sources can be used for remote identity proofing.&lt;br /&gt;
&lt;br /&gt;
However, legal restrictions such as personal data protection and the right of privacy, are legal restrictions in the fields of data transfers to third countries, data retention, data processing, and so on. The methodology established on this standard tries to solve these privacy issues.&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Standard DRAFT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- This is an open project, so you can check a draft of the document and contribute. The document is currently hosted on github: [https://github.com/luisenriquez/kbapmp]&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* We are currently debugging draft v12. Join us on github. Don't forget to commit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== [https://github.com/luisenriquez/kbapmp] == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=194837</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=194837"/>
				<updated>2015-05-14T18:06:45Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications.&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:There are 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is based on the OWASP Application Security Verification Standard(AVSV). Web applications will get a rating based on the Applications Security Verification levels on the AVSV standard(cursory, standard, opportunistic, and advanced).&lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden backdoors, and non-transparent policies. This label will require a Privacy scanning policy that may be based on the OWASP Top Ten Privacy project. Web applications must follow ethical principles of data processing and data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is only possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, APIs, and so on. This label is about Web Applications exposing all their ingredients, including third party code and dependencies.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This label consists on a scanning policy based on the OWASP Top Ten project, and making the scan visible. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in June - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered into the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) in a visible place within your Web application, copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling system requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, Web service providers assume a direct compromise with their users. &lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is being FIXED. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Openness label''' in June - 2015.&lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS SECURITY PROJECT'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses on your web applications in a visible place. You could also add them into your license contracts, terms of services or privacy policies. If your software is licensed under the terms of a generic-purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and maintainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This Web application  discloses a list of all its components and third party code, including source code, plug-ins, shared libraries. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THE WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: It is based on trust and reputation.&lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: Web Applications must be developed and maintained with a security orientation. &lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Users have the right to know if web applications are secure enough. This is the main purpose of OWASP. Currently we propose using the AVSV standard as it provides a basis for testing web application technical security controls. &lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: Surveillance code, missuse of personal data, and non-transparent policies are as dangerous as code vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
:  Users have the right to know how their information is processed and stored. We propose developing a privacy scan policy based on the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, and shared libraries.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to rate security. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Vulnerabilities such as XSS scripting and SQL injection must be efficiently fixed.&lt;br /&gt;
: Scan policies must be based on the OWASP Top ten Project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant - Hosting)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a logo and a declaration. The logo must be visible within the web application, and linked to the declaration and reports stored on the OWASP security labeling system records. The declaration may also be included within the web application, or as part of IT contracts, copyright licenses(additional terms for public licenses), terms of service, or privacy policies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled web applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''OPENNESS LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Get into the testing program.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the documents to other languages.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Web Application is labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS IS A SECURITY COMPROMISE BETWEEN THE ADMINISTRATOR of this Web Application, and the end users. This system is only based on trust and reputation. OWASP denies any liability, or damage claims of any kind.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security starts with secure coding and maintainance. This Web application is following the security guidelines of the OWASP Application Security Verification Standard. Reports can be downloaded &amp;quot;here&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Web application uses a scan policy based on the OWASP top ten Privacy project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application is regularly scanned by a policy based on the OWASP top ten project. Reports can be downloaded here.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS VALID AS LONG AS THIS WEB APPLICATION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=192488</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=192488"/>
				<updated>2015-03-31T18:12:57Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* NEWS AND EVENTS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Privacy label''' in April - 2015&lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS SECURITY PROJECT'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=191939</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=191939"/>
				<updated>2015-03-23T14:15:44Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The KBAPM Project==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBAPMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''The KBA Paradigms and Challenges'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBAPM Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBAPM Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBAPM Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBAPM Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday March 23, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
Our Meetings are Open and All are Welcome to Attend&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
&lt;br /&gt;
Welcome&lt;br /&gt;
&lt;br /&gt;
*'''Discussions:''' &lt;br /&gt;
** Building a KBA Evaluation Structure and Testing Methodology&lt;br /&gt;
** KBA Questions&lt;br /&gt;
** Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
*International Participants&lt;br /&gt;
*Discuss and Document Tools/Ways Update &lt;br /&gt;
*Information Management Update&lt;br /&gt;
*Blog Article Update&lt;br /&gt;
*Application to Conference in Amsterdam Update&lt;br /&gt;
**https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
**https://2015.appsec.eu/call-for-research/&lt;br /&gt;
&lt;br /&gt;
*Take aways: Tasks&lt;br /&gt;
*Schedule next meeting&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBAPM Project Metrics ==&lt;br /&gt;
https://www.openhub.net/accounts/KBAOpenHub&lt;br /&gt;
A performance metrics tool for the KBAPM Project&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBAPMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188868</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188868"/>
				<updated>2015-02-01T16:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean time we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Openness label''' in March - 2015&lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS LIST'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188414</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188414"/>
				<updated>2015-01-22T16:24:28Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* NEWS AND EVENTS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Openness label''' in March - 2015&lt;br /&gt;
&lt;br /&gt;
'''YOU ARE ALL INVITED TO JOIN THIS LIST'''.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188413</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188413"/>
				<updated>2015-01-22T16:23:42Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* NEWS AND EVENTS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. As this is an experimental idea, We will start implementing each label by separate. We will start with the '''Openness label''' in March - 2015&lt;br /&gt;
&lt;br /&gt;
Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188412</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188412"/>
				<updated>2015-01-22T16:23:05Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* NEWS AND EVENTS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. A this is an experimental idea, We will start implementing each label by separate. We will start with the Openness label in March - 2015&lt;br /&gt;
&lt;br /&gt;
Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188411</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=188411"/>
				<updated>2015-01-22T16:21:44Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
Due to the complexity of the tasks, the Labels will be implemented 1 by 1. The first Label to be implemented is the OPENNESS LABEL. We will start with this experimental implementation in March - 2015. In the mean we need open security promoters, to get submitted into the project's records.&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Mauricio Gálvez (Security Consultant)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182580</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182580"/>
				<updated>2014-09-19T13:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182579</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182579"/>
				<updated>2014-09-19T13:24:57Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet.''' This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182578</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182578"/>
				<updated>2014-09-19T13:24:00Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions. &lt;br /&gt;
&lt;br /&gt;
'''(3) Create a secure server in order to generate genuine certificates for the labeled applications. '''WE ARE HERE'''&lt;br /&gt;
&lt;br /&gt;
'''(4) Evaluate the labeling system with a voluntary Application on the Internet. This application will be promoted as the first Labeled application. We would start with the '''SECURITY LABEL''' If the results are good enough, we will add the other labels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''(4) Open the labeling system for any Application''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The labels can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182577</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=182577"/>
				<updated>2014-09-19T13:06:13Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A description of the security guides and the secure methodology used by the developer(s) of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not require unnecessary personal data of users. Personal data shall not be sold, commercialized, or miss-used  without the user's permission. &lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=180361</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=180361"/>
				<updated>2014-08-09T21:53:17Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: Security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=180360</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=180360"/>
				<updated>2014-08-09T21:49:27Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install the executable), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This label is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy,  Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy label is for Software free of non-authorized spyware, and web applications following ethical principles of data protection. &lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175328</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175328"/>
				<updated>2014-05-20T16:29:10Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his :device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency       check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Labelingsystem-widget.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Labelingsystem-widget.png&amp;diff=175327</id>
		<title>File:Labelingsystem-widget.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Labelingsystem-widget.png&amp;diff=175327"/>
				<updated>2014-05-20T16:27:49Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: Another example&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Another example&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Example-web-labeling.png&amp;diff=175326</id>
		<title>File:Example-web-labeling.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Example-web-labeling.png&amp;diff=175326"/>
				<updated>2014-05-20T16:08:27Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: Luisenriquez uploaded a new version of &amp;amp;quot;File:Example-web-labeling.png&amp;amp;quot;: width&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;example of widgets and look, for labeling system&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Example-report.png&amp;diff=175325</id>
		<title>File:Example-report.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Example-report.png&amp;diff=175325"/>
				<updated>2014-05-20T16:07:12Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: Luisenriquez uploaded a new version of &amp;amp;quot;File:Example-report.png&amp;amp;quot;: width&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;example for labeling system&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175324</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175324"/>
				<updated>2014-05-20T15:47:47Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his :device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency       check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
: '''S'''ecurity label (S).   &lt;br /&gt;
: '''P'''rivacy label (P). &lt;br /&gt;
: '''I'''ngredients label (I).&lt;br /&gt;
: '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175323</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175323"/>
				<updated>2014-05-20T15:46:31Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
:It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his :device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
:The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following :recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency      : check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or :surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data :protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is :built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their :components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on :exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
: Making security more visible.&lt;br /&gt;
: Is a transnational and market wise solution. &lt;br /&gt;
: Visual, and easy to apply. &lt;br /&gt;
: Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
 '''S'''ecurity label (S).   &lt;br /&gt;
 '''P'''rivacy label (P). &lt;br /&gt;
 '''I'''ngredients label (I).&lt;br /&gt;
 '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
: Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This  :label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
: This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized :without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
: Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
: The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
: Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
: Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
: avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
: It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
: last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
: The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
: Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
: but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175322</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175322"/>
				<updated>2014-05-20T15:43:31Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
 '''S'''ecurity label (S).   &lt;br /&gt;
 '''P'''rivacy label (P). &lt;br /&gt;
 '''I'''ngredients label (I).&lt;br /&gt;
 '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
: It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is : programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175321</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175321"/>
				<updated>2014-05-20T15:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security (S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy (P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients (I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness (O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator, legal representative, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
'''Which security labels can I add to my Software?'''&lt;br /&gt;
 '''S'''ecurity label (S).   &lt;br /&gt;
 '''P'''rivacy label (P). &lt;br /&gt;
 '''I'''ngredients label (I).&lt;br /&gt;
 '''O'''penness label (O). &lt;br /&gt;
&lt;br /&gt;
'''What is the Security label (S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Security label (S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label (P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will not be transfered or commercialized without your permission.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label (I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
'''Why is the Ingredients label (I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''What is the Openness label (O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
'''Why is the Openness label (O) relevant?'''&lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1) Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2) Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3) Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1 (source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2 (Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175102</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175102"/>
				<updated>2014-05-14T20:15:31Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://owaspsecuritylabelingsystem.blogspot.com/&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO pages for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175101</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175101"/>
				<updated>2014-05-14T20:09:38Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO page for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''''*/THIRD: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175100</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=175100"/>
				<updated>2014-05-14T20:07:12Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO page for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
'''''/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/'''''&lt;br /&gt;
&lt;br /&gt;
'''''/* FIRST: Show the labels on the download page*/'''''&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
'''''/*SECOND: Show the hash sum or a link of the hash sum in case of Privacy Label */'''''&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
'''''/*THIRD: The demo program is licensed under a GPL v3 license, with an OWASP Security Labeling System exception(Please read the license):*/'''''&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''/* FOURTH: The logos will be linked to the Security Labeling System Site. The certificate could look like this:*/'''''Italic text''&lt;br /&gt;
''&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
This Software will not sale or transfer you personal data without authorization. &lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
'''''/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
'''''&lt;br /&gt;
'''''/*FIRST: The logos could be placed in the front page of the website: */''&lt;br /&gt;
'''&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
'''/*SECOND: Add the OWASP Security Labeling System clause to your Terms and Conditions: */'''''Italic text''&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:'''/*(from here, clauses are not important)*/'''&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''*/FOURTH: The labeling logos of the front WebSite page should link to the OWASP Security Labeling System Site, and generate a certificate, such as:*/'''''Italic text''&lt;br /&gt;
&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application will not sale or transfer you personal data without your authorization. This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174916</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174916"/>
				<updated>2014-05-12T23:43:01Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The proposal of this project is READY. Time for Opinions and Corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO page for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:(from here, clauses are not important)&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174915</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174915"/>
				<updated>2014-05-12T23:10:20Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The project has begun. In this second phase we are shaping the labeling models. Please help us filling these OPINION POLLS:&lt;br /&gt;
*USERS POLL: https://docs.google.com/a/owasp.org/forms/d/1A0aijN4dI2HPZOktnRx8bWebrXlwI1C5Zh0gGcjSczE/&lt;br /&gt;
*DEVELOPERS POLL: https://docs.google.com/a/owasp.org/forms/d/1GNnve1SIxf8q5XGWZXJSmeSUzmKIEH5sQPQR3a-TTE8&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO page for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:(from here, clauses are not important)&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://172.16.208.128/mutillidae &lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174914</id>
		<title>OWASP Security Labeling System Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Labeling_System_Project&amp;diff=174914"/>
				<updated>2014-05-12T23:05:16Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_security_labeling_system2.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PURPOSE ==&lt;br /&gt;
Making security VISIBLE for everybody. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WHAT IS IT?==&lt;br /&gt;
It is system of security labels for web applications and software(in general). It can be used for any distributed software (when the user install in his device), or in web applications where the user connects to a server(as in cloud services).&lt;br /&gt;
&lt;br /&gt;
== HOW DOES IT WORK?==&lt;br /&gt;
The labeling system is classified by 4 labels:&lt;br /&gt;
&lt;br /&gt;
'''* Security(S).'''  Security starts with SECURE CODING, and secure maintenance. This badge is for Software developed with a secure life cycle, following recommended security coding practices(OWASP TOP TEN, OWASP security principles...) and recommended security tools(Zed Attack Proxy, SAINT, Dependency check...) &lt;br /&gt;
&lt;br /&gt;
'''* Privacy(P).'''  Security is also about TRUST. Technical security is not relevant if Software comes with hidden non-authorized backdoors, or surveillance code by default. This Privacy badge is for Software free of non-authorized spyware, and web applications following ethical principles of data protection.&lt;br /&gt;
&lt;br /&gt;
'''* Ingredients(I).'''  Security is also about TRANSPARENCY. This condition is possible through the use of Open Source Software. Contemporary Software is built(and linked) by many components such as shared libraries, third party code, APIS, and so on.  This label consists on Software exposing their components and third party code.&lt;br /&gt;
&lt;br /&gt;
'''* Openness(O).'''  Security might also be OPEN. Open security means having a fast and reliable IT security team. This openness label consists on exposing the Software or Web Application last vulnerability reports to the public.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IMPLEMENTATION==&lt;br /&gt;
&lt;br /&gt;
The System provides 4 logos and 4 clauses(1 for each label). The clauses can be added before the copyright public licenses as a &amp;quot;license exception&amp;quot;, or included in the warranty clause(or any other) in custom copyright licenses, license contracts, terms of services, or even privacy policies.&lt;br /&gt;
&lt;br /&gt;
STEP 1: Get Registered in the OWASP Security Labeling system Site.&lt;br /&gt;
&lt;br /&gt;
STEP 2: Download the label-logo(s) and paste before your copyright license, license contract, terms of service, or privacy policy.&lt;br /&gt;
&lt;br /&gt;
STEP 3: Incorporate the correspondent label-clause(s) into your copyright license, license contract,terms of service,or privacy policy.&lt;br /&gt;
&lt;br /&gt;
== COMPROMISES ==&lt;br /&gt;
- Between DEVELOPER and the OWASP SECURITY LABELING PROJECT. By including the Labeling-logos, the Developer gets the compromise of following the OWASP labeling requirements. &lt;br /&gt;
&lt;br /&gt;
- Between DEVELOPER and USERS. By incorporating the Labeling-Clauses, the Developer assumes a direct compromise with their software users. This compromise has a legal value as it is incorporated into the contract.&lt;br /&gt;
&lt;br /&gt;
- Between OWASP SECURITY LABELING PROJECT and USERS. Users can report violations of the labeling system to the OWASP labeling project Volunteers.  &lt;br /&gt;
&lt;br /&gt;
== PRESENTATION ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/luisenriquezA/owaspsecuritylabelingsystem&lt;br /&gt;
&lt;br /&gt;
== MOTIVATION ==&lt;br /&gt;
&lt;br /&gt;
After joining the OWASP community in my local chapter, I got the idea of a security labeling system. When I contacted Jeff Williams I found out that he already proposed a very similar idea few years ago. We think we can revive it. The OWASP international community has the purpose of  making security visible, and opinions from different sides are crucial in order to create a practical and widely used labeling system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* The project has begun. In this second phase we are shaping the labeling models. Please help us filling these OPINION POLLS:&lt;br /&gt;
*USERS POLL: https://docs.google.com/a/owasp.org/forms/d/1A0aijN4dI2HPZOktnRx8bWebrXlwI1C5Zh0gGcjSczE/&lt;br /&gt;
*DEVELOPERS POLL: https://docs.google.com/a/owasp.org/forms/d/1GNnve1SIxf8q5XGWZXJSmeSUzmKIEH5sQPQR3a-TTE8&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==LICENSING==&lt;br /&gt;
The OWASP Security Labeling System Project is free to use. All documentation is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Legal_Project]]&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
==CLASSIFICATIONS==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Labeling clauses =&lt;br /&gt;
''/*Add these clauses into your license contracts, terms of services or privacy policy(for the privacy label). If your software is licensed under the terms of a generic purpose FOSS public license(such as the GPL license, the Apache license, the Mozilla license, and so on...),you might add these clauses before the license terms as a license exception, or as additional terms.*/'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE ADMINISTRATOR or LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
==Security Label==&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE: Security is about secure coding. This software has been developed and is maintained following the highest secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Privacy Label==&lt;br /&gt;
[[File:Privacy-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The administrator,legal representer, or person in charge of this software will not sale, commercialize, or miss-use user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ingredients Label ==&lt;br /&gt;
[[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL CLAUSE: Security is about Transparency. This software discloses a list of all its software components in a human readable file, including source code, plug-ins, shared libraries, and third party code. This compromise is only effective is the provider distributes a list of all components within the packet, and a link to access the source code.&lt;br /&gt;
&lt;br /&gt;
==Openness Label ==&lt;br /&gt;
[[File:Openness-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE'S VERSION IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF THE SOFTWARE COMES AS SOURCE CODE OR BINARIES, PLEASE ADD THIS CLAUSE:&lt;br /&gt;
&lt;br /&gt;
The user must download this software from trusted sources, verify the correspondent hash-sum of the packets, and maintain the software with the recommended security updates and patches.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please visit the DEMO page for a guide on how to apply this system to your computer programs distribution, or web applications.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''' Why creating a security labeling system is important?'''&lt;br /&gt;
 Making security more visible.&lt;br /&gt;
 Is a transnational and market wise solution. &lt;br /&gt;
 Visual, and easy to apply. &lt;br /&gt;
 Different labeling categories for different purposes.&lt;br /&gt;
&lt;br /&gt;
 '''Which security labels can I add to my Software?'''&lt;br /&gt;
'''S'''ecurity label(S).   &lt;br /&gt;
'''P'''rivacy label(P). &lt;br /&gt;
'''I'''ngredients label(I).&lt;br /&gt;
'''O'''penness label(O). &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''What is the Security label(S) about?'''&lt;br /&gt;
 It certifies that certain software follows a secure life cycle, recommended scan policies, secure coding practices, quick vulnerabilities patches, and is programmed and maintained by developers with a software security orientation.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Security label(S) relevant?'''&lt;br /&gt;
 Many software projects are already using OWASP guides and tools. A lot of them require developers to follow the OWASP secure coding principles. This label will make these security practices visible for users.&lt;br /&gt;
&lt;br /&gt;
'''What is the Privacy label(P) about?'''&lt;br /&gt;
 This label certifies that your software does not come with non-authorized spyware, and that your personal data will be respected.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Privacy label relevant?'''&lt;br /&gt;
 Developers assume the legal compromise of not including hidden backdoors and surveillance code. &lt;br /&gt;
 The user would also have the obligation of checking the software hashsums.&lt;br /&gt;
&lt;br /&gt;
'''What is the Ingredients label(I) about?'''&lt;br /&gt;
 Is about exposing all the components of your software, such as API's, shared libraries, third party software.&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Ingredients label(I) relevant?'''&lt;br /&gt;
 Because it will help developers and users to identify properly third party code, evaluate the risks of using it, &lt;br /&gt;
 avoid non intentional license compatibility controversies, and so forth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What is the Openness label(O) about?'''&lt;br /&gt;
 It is dedicated to high security environments. Web Applications will expose their vulnerabilities of the &lt;br /&gt;
 last vulnerability scan the public. They will have the time to patch them until the next vulnerabilities scan. &lt;br /&gt;
 The scans should be fixed in a regular basis(e.g. each week).&lt;br /&gt;
&lt;br /&gt;
 '''Why is the Openness label(O) relevant?'''&lt;br /&gt;
 &lt;br /&gt;
 Getting this label means that a security team reveals their vulnerabilities to the public as expected. &lt;br /&gt;
 but at the same time, it shows to the public how good and fast they are in order to fix them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP Security Labeling System is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Luis Enriquez (Copyright &amp;amp; IT Lawyer)&lt;br /&gt;
* Jeff Williams (Computer Security Expert)&lt;br /&gt;
* Jorge Lara    (Graphical Designer)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The priorities of the OWASP Security Labeling System are:&lt;br /&gt;
&lt;br /&gt;
'''(1)Create and Distribute opinion polls to different sides involved in the IT environment'''(such as software developers, e-commerce agents, IT security firms, Cyber communities, Internet rights NGOs, lawyers, and of course, users). This stage has already begun, and results are helping us to shape &lt;br /&gt;
the model.&lt;br /&gt;
 &lt;br /&gt;
'''(2)Create the most suitable methodology for the security labeling system'''. At this point seems that the best methodology is to create a clause(or declaration) for each badge type, which will have to be included in IT contracts, licenses(additional terms for public licenses), terms of service, or privacy policies. The Developer has the compromise of providing the OWASP labeling system conditions.&lt;br /&gt;
&lt;br /&gt;
'''(3)Application of the labeling system.''' The OWASP labeling system volunteers will contribute to check that the system is working properly. The label can always be removed. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Labeling System is actively encouraged!&lt;br /&gt;
You do not have to be a security or legal expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Distribute the opinion polls.&lt;br /&gt;
* Improve the system. &lt;br /&gt;
* Translate the 'clauses' to other languages in a legal way.&lt;br /&gt;
* Improve this wiki.&lt;br /&gt;
&lt;br /&gt;
=DEMO1(source code)=&lt;br /&gt;
/*This example shows how to include the OWASP Security Labeling System clauses into a software download. The computer program jazz-scales.zip  includes the SECURITY, PRIVACY and INGREDIENTS labels:*/&lt;br /&gt;
&lt;br /&gt;
Jazz-scales  is labeled under the OWASP SECURITY LABELING SYSTEM as:&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-security-scaled.png]] [[File:Privacy-scaled.png]] [[File:Owasp-ingredients-scaled.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download jazz-scales.zip from here: [[File:Jazz-scales.zip]]&lt;br /&gt;
&lt;br /&gt;
You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
YOU MUST read the READ-ME file, and the LICENSE agreement before using this software.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this, after clicking the logo)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  Jazz scales corporation.&lt;br /&gt;
&lt;br /&gt;
TYPE: Computer program. (Source code )&lt;br /&gt;
&lt;br /&gt;
NAME:  Jazz-Scales.zip&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This software has been developed using the following security guides: OWASP Security Principles Project, OWASP Software security Assurance Process.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL: You must verify the hash-sum of the .zip package before installing:&lt;br /&gt;
&lt;br /&gt;
MD5sum= faffffac8cb288233951cee6587dee33&lt;br /&gt;
&lt;br /&gt;
SHA1sum= 00c533903ab6c3afc717021e724b479f8637c41a&lt;br /&gt;
&lt;br /&gt;
INGREDIENTS LABEL:  This computer program is distributed as source code and contains the following source files:&lt;br /&gt;
&lt;br /&gt;
scales.h&lt;br /&gt;
modal_music2.cpp&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DEMO2(Web Apps)=&lt;br /&gt;
/*This example shows how to apply the OWASP Security Labeling system clauses into your Web Site's TERMS AND CONDITIONS. They should be placed inside an OWASP Security Labeling System section. The labeling logos could be placed in your anywhere as long as they remain visible. (as in the front page of this Website, as widget). This Web Site uses 3 labels: security, Privacy, and Openness */&lt;br /&gt;
&lt;br /&gt;
[[File:Example-web-labeling.png]]&lt;br /&gt;
&lt;br /&gt;
''Please read carefully the following terms and conditions before registering and using this WebSite:&lt;br /&gt;
&lt;br /&gt;
1. OWASP SECURITY LABELING SYSTEM. This Software has been labeled under the OWASP security labeling system with the purpose of making security VISIBLE for everybody. THIS LEGAL COMPROMISE IS BETWEEN THE LEGAL REPRESENTATIVE OF THIS SOFTWARE, AND THE END USER.&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL CLAUSE:  Security is about secure coding. This software has been developed and is maintained following the highest OWASP secure coding practices. A list of all the security guides and tools used by the developers of this software must be included or linked through this notice.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL CLAUSE: Security is about Trust. This Software comes free of non authorized spy-ware or surveillance code of any kind. The legal representative, or person in charge of this software will not sale, commercialize, or missuse user's personal data without the user's permission.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL CLAUSE: Security is about Transparency. This Web Application makes available its latest vulnerability reports to the public. The report or a link to the report must be clearly published in this Web Application. This compromise is only effective if the vulnerability report's date is not older than 1 week.&lt;br /&gt;
&lt;br /&gt;
THIS COMPROMISE IS ONLY VALID AS LONG AS THIS SOFTWARE IS REGISTERED INTO THE OWASP SECURITY LABELING SYSTEM RECORDS.&lt;br /&gt;
&lt;br /&gt;
2.LIABILITY:(from here, clauses are not important)&lt;br /&gt;
-  By signing this agreement, the user assumes complete responsibility over their own uploaded content, including posts, comments, and forums. The FOSS lawyers Institute denies any liability and damages of any kind, concerning contents uploaded by the users.&lt;br /&gt;
&lt;br /&gt;
3.INTELLECTUAL PROPERTY:&lt;br /&gt;
- The contents published in this website are licensed by default using the CC by NC license. User's cannot publish works violating the copyrights of others. Such contents will be deleted.&lt;br /&gt;
&lt;br /&gt;
4. TERMINATION:&lt;br /&gt;
- You can always close your account in this website. We also reserve the right of closing user's accounts if they infringe the terms and conditions of this website.&lt;br /&gt;
''&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
'''CERTIFICATE'''(something like this)&lt;br /&gt;
&lt;br /&gt;
LEGAL REPRESENTATIVE:  FOSS Lawyers Institute.&lt;br /&gt;
&lt;br /&gt;
TYPE: Web Application.&lt;br /&gt;
&lt;br /&gt;
URL:  http://fosslawyers.org&lt;br /&gt;
&lt;br /&gt;
FURTHER INFORMATION:&lt;br /&gt;
&lt;br /&gt;
SECURITY LABEL: This Web Application has been developed and is maintained using: The OWASP TOP TEN Project, OWASP secure coding practices, and OWASP Security Principles Project.&lt;br /&gt;
&lt;br /&gt;
PRIVACY LABEL:  This Web Application follows the OWASP Top Ten Privacy Project.&lt;br /&gt;
&lt;br /&gt;
OPENNESS LABEL: Here you can find the lastest vulnerability report of this web application: [[File:Example-report.png]]&lt;br /&gt;
&lt;br /&gt;
REPORT  VIOLATIONS TO: OWASP_Security_Labeling_System_Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Security_Labeling_System_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Example-web-labeling.png&amp;diff=174913</id>
		<title>File:Example-web-labeling.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Example-web-labeling.png&amp;diff=174913"/>
				<updated>2014-05-12T23:04:05Z</updated>
		
		<summary type="html">&lt;p&gt;Luisenriquez: example of widgets and look, for labeling system&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;example of widgets and look, for labeling system&lt;/div&gt;</summary>
		<author><name>Luisenriquez</name></author>	</entry>

	</feed>