<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Orysegal</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Orysegal"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Orysegal"/>
		<updated>2026-05-09T06:51:04Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246664</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246664"/>
				<updated>2019-01-18T06:48:58Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: minor&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Sgoatbanner.png|center|frameless|1950x1950px]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. &lt;br /&gt;
&lt;br /&gt;
You can install ServerlessGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
OWASP ServerlessGoat is packaged as an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - this provides three important benefits:&lt;br /&gt;
* A single click installation process. No compilation, building or packaging required&lt;br /&gt;
* The application uses default serverless application repository permissions (SAM policy templates), making it more realistic&lt;br /&gt;
* The installation doesn't create custom IAM roles or resource policies on the account in which it is deployed in&lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
OWASP does not take responsibility for the way in which any one uses the ServerlessGoat application. OWASP made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing ServerlessGoat on production accounts.&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection (SAS-01)&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06)&lt;br /&gt;
* Application layer Denial of Service (SAS-08)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10)&lt;br /&gt;
* Other undisclosed *critical* issues, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
You can find a live version of the application hosted by PureSec in the following URL: https://www.serverless-hack.me/ &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by Ory Segal &amp;amp; Yuri Shapira @ [https://www.puresec.io/ PureSec]:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
You can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''1-click installation''' on your own AWS account via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
A '''live version''' of the application is hosted by PureSec at: https://www.serverless-hack.me/ &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246318</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246318"/>
				<updated>2019-01-02T11:33:13Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Added the link to the live version&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Sgoatbanner.png|center|frameless|1950x1950px]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. &lt;br /&gt;
&lt;br /&gt;
You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
OWASP ServerlessGoat is packaged as an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - this provides three important benefits:&lt;br /&gt;
* A single click installation process. No compilation, building or packaging required&lt;br /&gt;
* The application uses default serverless application repository permissions (SAM policy templates), making it more realistic&lt;br /&gt;
* The installation doesn't create custom IAM roles or resource policies on the account in which it is deployed in&lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
OWASP does not take responsibility for the way in which any one uses the ServerlessGoat application. OWASP made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing ServerlessGoat on production accounts.&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection (SAS-01)&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06)&lt;br /&gt;
* Application layer Denial of Service (SAS-08)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10)&lt;br /&gt;
* Other undisclosed *critical* issues, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
You can find a live version of the application hosted by PureSec in the following URL: https://www.serverless-hack.me/ &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by Ory Segal &amp;amp; Yuri Shapira @ [https://www.puresec.io/ PureSec]:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
You can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''1-click installation''' on your own AWS account via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
A '''live version''' of the application is hosted by PureSec at: https://www.serverless-hack.me/ &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246301</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246301"/>
				<updated>2018-12-29T13:14:57Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Sgoatbanner.png|center|frameless|1950x1950px]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. &lt;br /&gt;
&lt;br /&gt;
You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
OWASP ServerlessGoat is packaged as an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - this provides three important benefits:&lt;br /&gt;
* A single click installation process. No compilation, building or packaging required&lt;br /&gt;
* The application uses default serverless application repository permissions (SAM policy templates), making it more realistic&lt;br /&gt;
* The installation doesn't create custom IAM roles or resource policies on the account in which it is deployed in&lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
OWASP does not take responsibility for the way in which any one uses the ServerlessGoat application. OWASP made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing ServerlessGoat on production accounts.&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection (SAS-01)&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06)&lt;br /&gt;
* Application layer Denial of Service (SAS-08)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10)&lt;br /&gt;
* Other undisclosed *critical* issues, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by Ory Segal &amp;amp; Yuri Shapira @ [https://www.puresec.io/ PureSec]:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
You can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246300</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246300"/>
				<updated>2018-12-29T13:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Sgoatbanner.png|center|frameless|1500x1500px]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. &lt;br /&gt;
&lt;br /&gt;
You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
OWASP ServerlessGoat is packaged as an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - this provides three important benefits:&lt;br /&gt;
* A single click installation process. No compilation, building or packaging required&lt;br /&gt;
* The application uses default serverless application repository permissions (SAM policy templates), making it more realistic&lt;br /&gt;
* The installation doesn't create custom IAM roles or resource policies on the account in which it is deployed in&lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
OWASP does not take responsibility for the way in which any one uses the ServerlessGoat application. OWASP made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing ServerlessGoat on production accounts.&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection (SAS-01)&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06)&lt;br /&gt;
* Application layer Denial of Service (SAS-08)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10)&lt;br /&gt;
* Other undisclosed *critical* issues, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by Ory Segal &amp;amp; Yuri Shapira @ [https://www.puresec.io/ PureSec]:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
You can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sgoatbanner.png&amp;diff=246299</id>
		<title>File:Sgoatbanner.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sgoatbanner.png&amp;diff=246299"/>
				<updated>2018-12-29T13:09:42Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Serverless Goat OWASP Banner&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ServerlessGoat-Wide-Banner.png&amp;diff=246298</id>
		<title>File:ServerlessGoat-Wide-Banner.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ServerlessGoat-Wide-Banner.png&amp;diff=246298"/>
				<updated>2018-12-29T12:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ServerlessGoat Banner&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246297</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246297"/>
				<updated>2018-12-29T12:55:56Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Minor edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. &lt;br /&gt;
&lt;br /&gt;
You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
OWASP ServerlessGoat is packaged as an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - this provides three important benefits:&lt;br /&gt;
* A single click installation process. No compilation, building or packaging required&lt;br /&gt;
* The application uses default serverless application repository permissions (SAM policy templates), making it more realistic&lt;br /&gt;
* The installation doesn't create custom IAM roles or resource policies on the account in which it is deployed in&lt;br /&gt;
&lt;br /&gt;
== Disclaimer ==&lt;br /&gt;
OWASP does not take responsibility for the way in which any one uses the ServerlessGoat application. OWASP made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing ServerlessGoat on production accounts.&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection (SAS-01)&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06)&lt;br /&gt;
* Application layer Denial of Service (SAS-08)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10)&lt;br /&gt;
* Other undisclosed *critical* issues, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by Ory Segal &amp;amp; Yuri Shapira @ [https://www.puresec.io/ PureSec]:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
You can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246159</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246159"/>
				<updated>2018-12-19T17:08:34Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] , [https://www.puresec.io/ PureSec] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246152</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246152"/>
				<updated>2018-12-19T10:24:11Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''18-December-2018''': Initial release. Collect feedback from the public ('''done''') &lt;br /&gt;
* '''1-January-2019''': Beta release with additional features. &lt;br /&gt;
* '''15-January''': v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246122</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246122"/>
				<updated>2018-12-18T19:21:02Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Cheat Sheet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public (done) &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the [https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md LESSONS.md] file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246121</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246121"/>
				<updated>2018-12-18T19:20:05Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: minor&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public (done) &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the [LESSONS.md](https://github.com/OWASP/Serverless-Goat/blob/master/LESSONS.md) file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246120</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246120"/>
				<updated>2018-12-18T19:19:07Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public (done) &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the LESSONS.md file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246119</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246119"/>
				<updated>2018-12-18T19:12:32Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Cheat Sheet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
Note: you can find a full walkthrough (with spoilers of course) in the LESSONS.md file in the Git repo&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246113</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246113"/>
				<updated>2018-12-18T13:16:53Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Cheat Sheet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). Recursive invocation can be done by invoking the API with itself as the `document_url` parameter (URL-encoded), which by itself calls itself (double-URL encoded), etc. (x5 times).&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246112</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246112"/>
				<updated>2018-12-18T13:15:17Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246111</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246111"/>
				<updated>2018-12-18T13:14:40Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Final edits for publish&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities that are included are:&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Deployment ==  &lt;br /&gt;
&lt;br /&gt;
ServerlessGoat is a simple AWS Lambda application, which serves as a MS-Word .doc file to plain text converter service. It receives a URL to a .doc file as input, and will return the text inside the document back to the API caller. ​ The application is packaged and published for deployment through the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless Application Repository]. ​ Steps for deployment:&lt;br /&gt;
# Make sure you are logged into your AWS account&lt;br /&gt;
# Click on the following link: AWS Serverless Application Repository&lt;br /&gt;
# Click 'Deploy'&lt;br /&gt;
# Click 'Deploy' (again)&lt;br /&gt;
# Wait until you see the message 'Your application has been deployed'&lt;br /&gt;
# Click on 'View CloudFormation Stack'&lt;br /&gt;
# Under 'Outputs' you will find the URL for the application (WebsiteURL) ​&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
The following security issues exist in the application: ​&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Users can invoke the API with a &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; parameter value containing Linux OS commands. E.g. &amp;lt;code&amp;gt;; ls -LF&amp;lt;/code&amp;gt;&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* For example, invoking the API without the required parameter will return a verbose stack trace/exception&lt;br /&gt;
* Insecure Serverless Deployment Configuration (SAS-03)&lt;br /&gt;
* Publicly open S3 bucket (its name can be discovered from the subdomain/prefix of the URL)&lt;br /&gt;
* The parameter &amp;lt;code&amp;gt;document_url&amp;lt;/code&amp;gt; is not defined as a 'required' parameter in API gateway and can be ommitted&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* The function has CRUD permissions on the Dynamo table, which can be abused for reading sensitive data, or manipulating data&lt;br /&gt;
* The function has FullAccess policy on the S3 bucket, leading to data tampering and data leakage, etc.&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated thro\ugh CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* The vulnerable package is &amp;lt;code&amp;gt;node-uuid&amp;lt;/code&amp;gt;&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An attacker may invoke the API recursively multiple times, essentially spawning enough instances to reach the function's reserved capacity limit (which is set to 5). For example: &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://i92uw6vw73.execute-api.us-east-1.amazonaws.com/Prod/api/convert?document_url=https%3A%2F%2Fi92uw6vw73.execute-api.us-east-1.amazonaws.com%2FProd%2Fapi%2Fconvert%3Fdocument_url%3Dhttps%253A%252F%252Fi92uw6vw73.execute-api.us-east-1.amazonaws.com%252FProd%252Fapi%252Fconvert%253Fdocument_url%253Dhttps%25253A%25252F%25252Fi92uw6vw73.execute-api.us-east-1.amazonaws.com%25252FProd%25252Fapi%25252Fconvert%25253Fdocument_url%25253Dhttps%2525253A%2525252F%2525252Fi92uw6vw73.execute-api.us-east-1.amazonaws.com%2525252FProd%2525252Fapi%2525252Fconvert%2525253Fdocument_url%2525253Dhttp%252525253A%252525252F%252525252Fwww.snee.com%252525252Fxml%252525252Fxslt%252525252Fsample.doc&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;.&lt;br /&gt;
* An undisclosed ''critical'' issue, as a bonus! ​&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
Deployment via the [https://serverlessrepo.aws.amazon.com/applications/arn:aws:serverlessrepo:us-east-1:761130837472:applications~serverless-goat AWS Serverless App Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246103</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246103"/>
				<updated>2018-12-17T19:37:13Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Project Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
=== The vulnerabilities that are included are:  (* spoiler alert! *)===&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246102</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246102"/>
				<updated>2018-12-17T19:14:44Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* The vulnerabilities that are included are (* spoiler alert! *) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
=== The vulnerabilities that are included are:  (* spoiler alert! *)===&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed and sponsored by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246101</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246101"/>
				<updated>2018-12-17T19:02:40Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: license&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
=== The vulnerabilities that are included are (* spoiler alert! *)===&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. You can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed and sponsored by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246097</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246097"/>
				<updated>2018-12-17T18:20:56Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Sponsors fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
=== The vulnerabilities that are included are (* spoiler alert! *)===&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. It is licensed under the MIT license.   &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project was initially developed and sponsored by PureSec:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246095</id>
		<title>OWASP Serverless Goat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Serverless_Goat&amp;diff=246095"/>
				<updated>2018-12-17T17:51:04Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: initial release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.&lt;br /&gt;
&lt;br /&gt;
As serverless adoption is expected to continue growing and reach new audiences, we see the importance of education on topics such as how to build robust, secure and reliable AWS Lambda serverless applications. This project will expose developers and security practitioners to basic serverless security concepts, risks, attacks and mitigation best-practices.&lt;br /&gt;
 &lt;br /&gt;
There were a few key principles that we wanted to follow when designing this demo vulnerable application:&lt;br /&gt;
* Make the project open source and free for everyone to use&lt;br /&gt;
* Simple and straightforward deployment&lt;br /&gt;
* Demonstrate as many serverless security bad practices as possible (we will keep adding more issues, but also hope to see community contributions)&lt;br /&gt;
* Design the application to be realistic, and include common 'bad-practices', rather than forcing it to be vulnerable artificially&lt;br /&gt;
&lt;br /&gt;
Given these key principles, we chose to develop and package the application an AWS SAM application that's available for deployment through the [https://aws.amazon.com/serverless/serverlessrepo/ AWS Serverless Application Repository] - however, this meant that we had to use the supported SAM policy templates. While this decision imposes some limitations on what capabilities were available for us, it presented two important benefits:&lt;br /&gt;
* The application uses &amp;quot;default&amp;quot; serverless application repository permissions, making it more realistic&lt;br /&gt;
* The deployment doesn't create custom IAM roles or resource policies&lt;br /&gt;
&lt;br /&gt;
==  Details==&lt;br /&gt;
The application is a service which receives a URL to a Word document (with a .doc extension - Office 97-2004), and will reply with an HTML page containing the extracted text.&lt;br /&gt;
&lt;br /&gt;
=== The vulnerabilities that are included are (* spoiler alert! *)===&lt;br /&gt;
* Event-data injection, leading to OS command injection (SAS-01)&lt;br /&gt;
* Improper exception handling and verbose error messages (SAS-10), leading to sensitive information disclosure&lt;br /&gt;
* Insecure Serverless Deployment Configuration, leading to S3 bucket data exposure (SAS-03)&lt;br /&gt;
* Over-privileged function permissions &amp;amp; roles, leading to data leakage of information stored in a DynamoDB table (SAS-04)&lt;br /&gt;
* Inadequate function monitoring and logging (SAS-05) - the application doesn't properly log application layer attacks and errors (can be demonstrated through CloudWatch/CloudTrail)&lt;br /&gt;
* Insecure 3rd Party Dependencies (SAS-06) - can be detected by scanning the project with an OSS scanning tool&lt;br /&gt;
* Application layer Denial of Service (SAS-08), which can be easily demonstrated&lt;br /&gt;
* An undisclosed *critical* issue, as a bonus!&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP ServerlessGoat project is free for use. It is licensed under the MIT license.   &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* 18-December-2018: Initial version / Alpha release. Collect feedback from the public &lt;br /&gt;
* 1-January-2019: Beta release with additional features. &lt;br /&gt;
* 15-January: v1.0 official launch&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
TBD&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Serverless-Goat Project GitHub]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243760</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243760"/>
				<updated>2018-09-27T05:29:28Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute.  &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This project is a continuation of a previous project - &amp;quot;[https://www.puresec.io/press_releases/sas_top_10_2018_released The Serverless Security Top 10 Most Common Weaknesses Guide]&amp;quot;, which was released on January 17th 2018 by PureSec, with collaboration of industry thought leaders from: IBM, iRobot, Denim Group, Cisco, Nordstrom, Asurion, Capital One, Microsoft, Check Point, A Cloud Guru and Cloud Academy. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).    &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''29-SEP-2018''': Initial draft&lt;br /&gt;
* '''8-NOV-2018''': Alpha release / Official public call&lt;br /&gt;
* '''27-DEC-2019''': End of public call / Processing data collected&lt;br /&gt;
* '''18-FEB-2019''': Release candidate for review&lt;br /&gt;
* '''27-MAR-2019''': Official release    &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-cloud-native-application-security-top-10 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Cloud-Native-Application-Security-Top-10 Github]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243729</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243729"/>
				<updated>2018-09-26T15:32:36Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).    &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''29-SEP-2018''': Initial draft&lt;br /&gt;
* '''8-NOV-2018''': Alpha release / Official public call&lt;br /&gt;
* '''27-DEC-2019''': End of public call / Processing data collected&lt;br /&gt;
* '''18-FEB-2019''': Release candidate for review&lt;br /&gt;
* '''27-MAR-2019''': Official release    &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]] ([mailto:ory.segal@owasp.org email])&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-cloud-native-application-security-top-10 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Cloud-Native-Application-Security-Top-10 Github]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243694</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243694"/>
				<updated>2018-09-25T07:48:27Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).    &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''29-SEP-2018''': Initial draft&lt;br /&gt;
* '''8-NOV-2018''': Alpha release / Official public call&lt;br /&gt;
* '''27-DEC-2019''': End of public call / Processing data collected&lt;br /&gt;
* '''18-FEB-2019''': Release candidate for review&lt;br /&gt;
* '''27-MAR-2019''': Official release    &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-cloud-native-application-security-top-10 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Github Repo ==&lt;br /&gt;
[https://github.com/OWASP/Cloud-Native-Application-Security-Top-10 Github]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243693</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243693"/>
				<updated>2018-09-25T07:46:38Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).    &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''29-SEP-2018''': Initial draft&lt;br /&gt;
* '''8-NOV-2018''': Alpha release / Official public call&lt;br /&gt;
* '''27-DEC-2019''': End of public call / Processing data collected&lt;br /&gt;
* '''18-FEB-2019''': Release candidate for review&lt;br /&gt;
* '''27-MAR-2019''': Official release    &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Project Mailing List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-cloud-native-application-security-top-10 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243659</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243659"/>
				<updated>2018-09-24T06:16:57Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).    &lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* '''29-SEP-2018''': Initial draft&lt;br /&gt;
* '''8-NOV-2018''': Alpha release / Official public call&lt;br /&gt;
* '''27-DEC-2019''': End of public call / Processing data collected&lt;br /&gt;
* '''18-FEB-2019''': Release candidate for review&lt;br /&gt;
* '''27-MAR-2019''': Official release    &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243620</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243620"/>
				<updated>2018-09-22T19:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Cloud-Native Top 10 is free for use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license] (CC BY-SA 4.0).  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243551</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243551"/>
				<updated>2018-09-20T05:25:45Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless|link=https://www.puresec.io/]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243550</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243550"/>
				<updated>2018-09-20T05:25:03Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Project Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[https://www.puresec.io/][[File:PureSec-Logo.png|frameless]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243549</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243549"/>
				<updated>2018-09-20T05:23:44Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Project Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[[File:PureSec-Logo.png|frameless]]&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243548</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243548"/>
				<updated>2018-09-20T05:23:12Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The project is sponsored by:&lt;br /&gt;
[[File:PureSec-Logo.png|left|frameless|puresec]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243547</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243547"/>
				<updated>2018-09-20T05:17:15Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
[[File:PureSec-Logo.png|left|frameless|puresec]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243546</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243546"/>
				<updated>2018-09-20T05:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: initial modifications&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
[[File:PureSec-Logo.png|left|frameless|puresec]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:PureSec-Logo.png&amp;diff=243545</id>
		<title>File:PureSec-Logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:PureSec-Logo.png&amp;diff=243545"/>
				<updated>2018-09-20T05:13:58Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PureSec Logo&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243544</id>
		<title>OWASP Cloud-Native Application Security Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cloud-Native_Application_Security_Top_10&amp;diff=243544"/>
				<updated>2018-09-20T05:12:42Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Initial text&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Introduction==&lt;br /&gt;
Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, cloud functions (serverless), service meshes, micro-services, immutable infrastructure, and declarative APIs exemplify this approach. Cloud-Native Applications is a fundamentally new and exciting approach to designing and building software. However, it also raises a completely new set of security challenges. For example, when you move to a microservice model, end-to-end visibility, monitoring and detection become more complex and difficult to execute. &lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
The primary goal of this document is to provide assistance and education for organizations looking to adopt Cloud-Native Applications. The guide provides information about what are the most prominent security risks for Cloud-Native applications, the challenges involved, and how to overcome them.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP Cloud-Native Application Security Top 10 and any contributions are Copyright &amp;amp;copy; by OWASP 2018.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments.&lt;br /&gt;
Possible ways to get contribute:&lt;br /&gt;
* We are actively looking for organizations and individuals that will provide vulnerability prevalence data.&lt;br /&gt;
* Translation efforts (later stages)&lt;br /&gt;
* Individuals and organizations that will contribute to the project will listed on the acknowledgments page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Orysegal|Ory Segal]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243366</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243366"/>
				<updated>2018-09-13T18:10:31Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec (Serverless Security). Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit. &lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
[https://www.linkedin.com/in/orysegal/ LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/orysegal Twitter]&lt;br /&gt;
&lt;br /&gt;
Email: orysegal [  at  ]  gmail.com&lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;br /&gt;
&lt;br /&gt;
== Experience ==&lt;br /&gt;
2017 - Present: CTO &amp;amp; co-founder at [https://www.puresec.io/ PureSec] (Serverless Security)&lt;br /&gt;
&lt;br /&gt;
2012 - 2017: Sr. Director, Threat Research at [https://www.akamai.com/ Akamai]&lt;br /&gt;
&lt;br /&gt;
2007 - 2012: Security Products Architect (AppScan) at [https://www.ibm.com/ IBM]&lt;br /&gt;
&lt;br /&gt;
2005 - 2007: Director of Security Research at [https://www.crunchbase.com/organization/watchfire Watchfire] (acquired by IBM)&lt;br /&gt;
&lt;br /&gt;
2000 - 2005: Senior Security Researcher at [https://www.crunchbase.com/organization/sanctum-inc Sanctum inc] (acquired by Watchfire)&lt;br /&gt;
&lt;br /&gt;
1997 - 2000: Penetration Testing Team Leader at [http://www.avnet-cyber.com/ Avnet] Cyber Security&lt;br /&gt;
&lt;br /&gt;
== Notable Publications ==&lt;br /&gt;
* [https://www.puresec.io/hubfs/Apache%20OpenWhisk%20PureSec%20Security%20Advisory.pdf Apache OpenWhisk Serverless 'Action' Mutability Weakness] (advisory / whitepaper)&lt;br /&gt;
* [https://www.puresec.io/hubfs/New%20Attack%20Vector_%20Serverless%20Crypto-Mining.pdf Serverless Crypto-Mining] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/us/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf HTTP/2.0 Passive Client Fingerprinting] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/jp/ja/multimedia/documents/state-of-the-internet/sshowdown-exploitation-of-iot-devices-for-launching-mass-scale-attack-campaigns.pdf SSHowDowN]: Exploitation of IoT Devices for Launching Mass-Scale Attack Campaigns (whitepaper)&lt;br /&gt;
* [https://blogs.akamai.com/2014/02/hql-statement-tampering.html HQL Statement Tampering] (advisory / whitepaper)&lt;br /&gt;
* [http://blog.watchfire.com/wfblog/2008/06/javascript-code.html JavaScript Code Flow Manipulation] (blog/advisory)&lt;br /&gt;
* [https://www.slideshare.net/ibmrational/a-look-at-the-prevalence-of-clientside-javascript-vulnerabilities-in-web-applications Close Encounters of the Third Kind]: A Look at the Prevalence of Client-Side JavaScript Vulnerabilities (whitepaper)&lt;br /&gt;
* [https://www.slideshare.net/orysegal/clientside-javascript-vulnerabilities Client-Side JavaScript Vulnerabilities] (presentation)&lt;br /&gt;
* [https://packetstormsecurity.com/files/25903/Apache.Win32.txt.html Vulnerability in Apache for Win32 batch file processing] (Remote Command Execution, advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/33006/msSharePointXSS.txt.html Multiple XSS vulnerabilities in Microsoft SharePoint Portal Server] (advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/34646/iis5x60.txt.html IIS 5.x/6.0 WebDAV (XML parser) attribute blowup DoS] (with Amit Klein)&lt;br /&gt;
* [https://seclists.org/vuln-dev/2002/May/346 Multiple vendors web server source code disclosure (8.3 name format vulnerability - Take II)] (with Amit Klein)&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243365</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243365"/>
				<updated>2018-09-13T18:09:02Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec (Serverless Security). Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit. &lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
[https://www.linkedin.com/in/orysegal/ LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/orysegal Twitter]&lt;br /&gt;
&lt;br /&gt;
[mailto://orysegal@gmail.com Email]&lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;br /&gt;
&lt;br /&gt;
== Experience ==&lt;br /&gt;
2017 - Present: CTO &amp;amp; co-founder at [https://www.puresec.io/ PureSec] (Serverless Security)&lt;br /&gt;
&lt;br /&gt;
2012 - 2017: Sr. Director, Threat Research at [https://www.akamai.com/ Akamai]&lt;br /&gt;
&lt;br /&gt;
2007 - 2012: Security Products Architect (AppScan) at [https://www.ibm.com/ IBM]&lt;br /&gt;
&lt;br /&gt;
2005 - 2007: Director of Security Research at [https://www.crunchbase.com/organization/watchfire Watchfire] (acquired by IBM)&lt;br /&gt;
&lt;br /&gt;
2000 - 2005: Senior Security Researcher at [https://www.crunchbase.com/organization/sanctum-inc Sanctum inc] (acquired by Watchfire)&lt;br /&gt;
&lt;br /&gt;
1997 - 2000: Penetration Testing Team Leader at [http://www.avnet-cyber.com/ Avnet] Cyber Security&lt;br /&gt;
&lt;br /&gt;
== Notable Publications ==&lt;br /&gt;
* [https://www.puresec.io/hubfs/Apache%20OpenWhisk%20PureSec%20Security%20Advisory.pdf Apache OpenWhisk Serverless 'Action' Mutability Weakness] (advisory / whitepaper)&lt;br /&gt;
* [https://www.puresec.io/hubfs/New%20Attack%20Vector_%20Serverless%20Crypto-Mining.pdf Serverless Crypto-Mining] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/us/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf HTTP/2.0 Passive Client Fingerprinting] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/jp/ja/multimedia/documents/state-of-the-internet/sshowdown-exploitation-of-iot-devices-for-launching-mass-scale-attack-campaigns.pdf SSHowDowN]: Exploitation of IoT Devices for Launching Mass-Scale Attack Campaigns (whitepaper)&lt;br /&gt;
* [https://blogs.akamai.com/2014/02/hql-statement-tampering.html HQL Statement Tampering] (advisory / whitepaper)&lt;br /&gt;
* [http://blog.watchfire.com/wfblog/2008/06/javascript-code.html JavaScript Code Flow Manipulation] (blog/advisory)&lt;br /&gt;
* [https://www.slideshare.net/ibmrational/a-look-at-the-prevalence-of-clientside-javascript-vulnerabilities-in-web-applications Close Encounters of the Third Kind]: A Look at the Prevalence of Client-Side JavaScript Vulnerabilities (whitepaper)&lt;br /&gt;
* [https://www.slideshare.net/orysegal/clientside-javascript-vulnerabilities Client-Side JavaScript Vulnerabilities] (presentation)&lt;br /&gt;
* [https://packetstormsecurity.com/files/25903/Apache.Win32.txt.html Vulnerability in Apache for Win32 batch file processing] (Remote Command Execution, advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/33006/msSharePointXSS.txt.html Multiple XSS vulnerabilities in Microsoft SharePoint Portal Server] (advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/34646/iis5x60.txt.html IIS 5.x/6.0 WebDAV (XML parser) attribute blowup DoS] (with Amit Klein)&lt;br /&gt;
* [https://seclists.org/vuln-dev/2002/May/346 Multiple vendors web server source code disclosure (8.3 name format vulnerability - Take II)] (with Amit Klein)&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243364</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243364"/>
				<updated>2018-09-13T18:04:12Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec (Serverless Security). Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;br /&gt;
&lt;br /&gt;
== Experience ==&lt;br /&gt;
2017 - Present: CTO &amp;amp; co-founder at [https://www.puresec.io/ PureSec] (Serverless Security)&lt;br /&gt;
&lt;br /&gt;
2012 - 2017: Sr. Director, Threat Research at [https://www.akamai.com/ Akamai]&lt;br /&gt;
&lt;br /&gt;
2007 - 2012: Security Products Architect (AppScan) at [https://www.ibm.com/ IBM]&lt;br /&gt;
&lt;br /&gt;
2005 - 2007: Director of Security Research at [https://www.crunchbase.com/organization/watchfire Watchfire] (acquired by IBM)&lt;br /&gt;
&lt;br /&gt;
2000 - 2005: Senior Security Researcher at [https://www.crunchbase.com/organization/sanctum-inc Sanctum inc] (acquired by Watchfire)&lt;br /&gt;
&lt;br /&gt;
1997 - 2000: Penetration Testing Team Leader at [http://www.avnet-cyber.com/ Avnet] Cyber Security&lt;br /&gt;
&lt;br /&gt;
== Notable Publications ==&lt;br /&gt;
* [https://www.puresec.io/hubfs/Apache%20OpenWhisk%20PureSec%20Security%20Advisory.pdf Apache OpenWhisk Serverless 'Action' Mutability Weakness] (advisory / whitepaper)&lt;br /&gt;
* [https://www.puresec.io/hubfs/New%20Attack%20Vector_%20Serverless%20Crypto-Mining.pdf Serverless Crypto-Mining] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/us/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf HTTP/2.0 Passive Client Fingerprinting] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/jp/ja/multimedia/documents/state-of-the-internet/sshowdown-exploitation-of-iot-devices-for-launching-mass-scale-attack-campaigns.pdf SSHowDowN]: Exploitation of IoT Devices for Launching Mass-Scale Attack Campaigns (whitepaper)&lt;br /&gt;
* [https://blogs.akamai.com/2014/02/hql-statement-tampering.html HQL Statement Tampering] (advisory / whitepaper)&lt;br /&gt;
* [http://blog.watchfire.com/wfblog/2008/06/javascript-code.html JavaScript Code Flow Manipulation] (blog/advisory)&lt;br /&gt;
* [https://www.slideshare.net/ibmrational/a-look-at-the-prevalence-of-clientside-javascript-vulnerabilities-in-web-applications Close Encounters of the Third Kind]: A Look at the Prevalence of Client-Side JavaScript Vulnerabilities (whitepaper)&lt;br /&gt;
* [https://www.slideshare.net/orysegal/clientside-javascript-vulnerabilities Client-Side JavaScript Vulnerabilities] (presentation)&lt;br /&gt;
* [https://packetstormsecurity.com/files/25903/Apache.Win32.txt.html Vulnerability in Apache for Win32 batch file processing] (Remote Command Execution, advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/33006/msSharePointXSS.txt.html Multiple XSS vulnerabilities in Microsoft SharePoint Portal Server] (advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/34646/iis5x60.txt.html IIS 5.x/6.0 WebDAV (XML parser) attribute blowup DoS] (with Amit Klein)&lt;br /&gt;
* [https://seclists.org/vuln-dev/2002/May/346 Multiple vendors web server source code disclosure (8.3 name format vulnerability - Take II)] (with Amit Klein)&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243363</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243363"/>
				<updated>2018-09-13T17:55:18Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec (Serverless Security). Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;br /&gt;
&lt;br /&gt;
== Experience ==&lt;br /&gt;
2017 - Present: CTO &amp;amp; co-founder at [https://www.puresec.io/ PureSec] (Serverless Security)&lt;br /&gt;
&lt;br /&gt;
2012 - 2017: Sr. Director, Threat Research at [https://www.akamai.com/ Akamai]&lt;br /&gt;
&lt;br /&gt;
2007 - 2012: Security Products Architect (AppScan) at [https://www.ibm.com/ IBM]&lt;br /&gt;
&lt;br /&gt;
2005 - 2007: Director of Security Research at [https://www.crunchbase.com/organization/watchfire Watchfire] (acquired by IBM)&lt;br /&gt;
&lt;br /&gt;
2000 - 2005: Senior Security Researcher at [https://www.crunchbase.com/organization/sanctum-inc Sanctum inc] (acquired by Watchfire)&lt;br /&gt;
&lt;br /&gt;
1997 - 2000: Penetration Testing Team Leader at [http://www.avnet-cyber.com/ Avnet] Cyber Security&lt;br /&gt;
&lt;br /&gt;
== Notable Publications ==&lt;br /&gt;
* [https://www.puresec.io/hubfs/Apache%20OpenWhisk%20PureSec%20Security%20Advisory.pdf Apache OpenWhisk Serverless 'Action' Mutability Weakness] (advisory / whitepaper)&lt;br /&gt;
* [https://www.puresec.io/hubfs/New%20Attack%20Vector_%20Serverless%20Crypto-Mining.pdf Serverless Crypto-Mining] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/us/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf HTTP/2.0 Passive Client Fingerprinting] (whitepaper)&lt;br /&gt;
* [https://www.akamai.com/jp/ja/multimedia/documents/state-of-the-internet/sshowdown-exploitation-of-iot-devices-for-launching-mass-scale-attack-campaigns.pdf SSHowDowN]: Exploitation of IoT Devices for Launching Mass-Scale Attack Campaigns (whitepaper)&lt;br /&gt;
* [https://blogs.akamai.com/2014/02/hql-statement-tampering.html HQL Statement Tampering] (advisory / whitepaper)&lt;br /&gt;
* [https://www.slideshare.net/ibmrational/a-look-at-the-prevalence-of-clientside-javascript-vulnerabilities-in-web-applications Close Encounters of the Third Kind]: A Look at the Prevalence of Client-Side JavaScript Vulnerabilities (whitepaper)&lt;br /&gt;
* [https://www.slideshare.net/orysegal/clientside-javascript-vulnerabilities Client-Side JavaScript Vulnerabilities] (presentation)&lt;br /&gt;
* [https://packetstormsecurity.com/files/25903/Apache.Win32.txt.html Vulnerability in Apache for Win32 batch file processing] (Remote Command Execution, advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/33006/msSharePointXSS.txt.html Multiple XSS vulnerabilities in Microsoft SharePoint Portal Server] (advisory)&lt;br /&gt;
* [https://packetstormsecurity.com/files/34646/iis5x60.txt.html IIS 5.x/6.0 WebDAV (XML parser) attribute blowup DoS] (with Amit Klein)&lt;br /&gt;
* [https://seclists.org/vuln-dev/2002/May/346 Multiple vendors web server source code disclosure (8.3 name format vulnerability - Take II)] (with Amit Klein)&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243362</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243362"/>
				<updated>2018-09-13T17:36:42Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec, a start-up that enables organizations to secure serverless applications. Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;br /&gt;
&lt;br /&gt;
== Experience ==&lt;br /&gt;
2017 - Present: CTO &amp;amp; co-founder at [https://www.puresec.io/ PureSec] (Serverless Security)&lt;br /&gt;
&lt;br /&gt;
2012 - 2017: Sr. Director, Threat Research at [https://www.akamai.com/ Akamai]&lt;br /&gt;
&lt;br /&gt;
2007 - 2012: Security Products Architect (AppScan) at [https://www.ibm.com/ IBM]&lt;br /&gt;
&lt;br /&gt;
2005 - 2007: Director of Security Research at [https://www.crunchbase.com/organization/watchfire Watchfire] (acquired by IBM)&lt;br /&gt;
&lt;br /&gt;
2000 - 2005: Senior Security Researcher at [https://www.crunchbase.com/organization/sanctum-inc Sanctum inc] (acquired by Watchfire)&lt;br /&gt;
&lt;br /&gt;
1997 - 2000: Penetration Testing Team Leader at [http://www.avnet-cyber.com/ Avnet] Cyber Security&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243361</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243361"/>
				<updated>2018-09-13T17:27:49Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Ory Segal.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec, a start-up that enables organizations to secure serverless applications. Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ory_Segal.png&amp;diff=243360</id>
		<title>File:Ory Segal.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ory_Segal.png&amp;diff=243360"/>
				<updated>2018-09-13T17:27:10Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ory Segal&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243239</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243239"/>
				<updated>2018-09-07T16:01:00Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Minor edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec, a start-up that enables organizations to secure serverless applications. Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Community / Industry Contributions &amp;amp; Participation ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;br /&gt;
* The Ten Most Critical Risks for Serverless Applications v1.0: https://github.com/puresec/sas-top-10&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243238</id>
		<title>User:Orysegal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Orysegal&amp;diff=243238"/>
				<updated>2018-09-07T15:58:46Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: Initial page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ABOUT =&lt;br /&gt;
== BIO ==&lt;br /&gt;
Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec, a start-up that enables organizations to secure serverless applications. Prior to PureSec, Ory was Senior Director of threat research at Akamai, where he led a team of web security and big data researchers, responsible for developing algorithms for Akamai's Kona cloud security product line. In this role, Ory research and published articles about web security, bot management, client reputation and device fingerprinting. Prior to Akamai, Ory worked at IBM as the security products architect and product manager for the market leading application security solution IBM Security AppScan (previously Watchfire/Sanctum AppScan), a product which Ory developed and contributed to since the year 2000.  Ory authored 20 patents in the field of application security, static analysis, dynamic analysis, threat reputation and systems. He is currently serving as an officer of the Web Application Security Consortium (WASC), he was a member of the W3C WebAppSec working group, and was an OWASP Israel board member. Ory is a regular conference presenter and presented in conferences such as: Blackhat, RSA, OWASP AppSec, CyberTech, ServerlessDays, CodeBlue and Gartner Security Summit, &lt;br /&gt;
&lt;br /&gt;
== Contributions ==&lt;br /&gt;
* [[WASC OWASP Web Application Firewall Evaluation Criteria Project]]&lt;br /&gt;
* OWASP AppSec NYC: Big Data Intelligence https://www.youtube.com/watch?v=afMvndBEv-I&lt;br /&gt;
* CWE/SANS Top 25: https://www.sans.org/top25-software-errors&lt;br /&gt;
* WASC Static Analysis Evaluation Criteria: http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&lt;br /&gt;
* WASC Threat Classification (TC): http://projects.webappsec.org/w/page/13246978/Threat%20Classification&lt;br /&gt;
* WASC Web Application Security Scanner Evaluation Criteria: http://projects.webappsec.org/w/page/13246986/Web%20Application%20Security%20Scanner%20Evaluation%20Criteria&lt;br /&gt;
* NIST SAMATE - Software Assurance Metrics And Tool Evaluation: https://samate.nist.gov/Main_Page.html&lt;br /&gt;
* W3C Web Application Security Working Group: https://www.w3.org/2000/09/dbwg/details?group=49309&amp;amp;public=1&amp;amp;order=org&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178687</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178687"/>
				<updated>2014-07-14T06:30:48Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* What Should You Prepare as a Sponsor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]  &lt;br /&gt;
&lt;br /&gt;
OWASP is an open source, non-profit organization. While our activities are free for all, we do have costs, and need your help to make our activities better. &amp;lt;br&amp;gt;&lt;br /&gt;
We are also open to any other non-financial sponsorship ideas that you may have. These are some simple ways in which you can help us:   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference == &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israel chapter hosts a Regional Conference once a year, usually in September or October. This year as in previous years, we are holding the Conference in partnership with the Efi Arazi Computer Science School at the the Interdisciplinary Center (IDC) Herzliya. [[Israel#Previous_OWASP_Israel_Conferences_and_Meetings|These conferences]] are always very successful and a large number of people attend.&lt;br /&gt;
&lt;br /&gt;
We encourage companies to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Since the conferences draw an increasingly large number of people, our expenses are also rising accordingly.    &lt;br /&gt;
&lt;br /&gt;
If you or your company benefits from OWASP materials and/or conferences, we encourage you to support us! Moreover, the associated publicity and community goodwill can go a long way. We have several levels of sponsorship available, appropriate for the different organizations that wish to support our activities. Of course, if you are a Corporate Member of OWASP (at any level) and allocate a percentage (20-40%) of your membership fees to the Israel chapter, we can consider those funds as conference sponsorship.  It is also possible to be creative and find non-financial ways to support us and contribute to the successful running of the conference. (If you have ideas please contact [mailto:douglen@hotmail.com AviD] directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Check Point, Microsoft, F5, IBM, Breach Security, Ernst &amp;amp; Young, Comsec, Checkmarx, Imperva, Quotium, Akamai, and many others'''&lt;br /&gt;
&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Get for Sponsoring ===&lt;br /&gt;
All sponsors, regardless of sponsorship level receive the following: &lt;br /&gt;
&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* Access to all the tools, guides, and libraries OWASP makes available for everybody - if you benefit from these, support the organization! &lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* In general, if there is something else specific that you may want, and is within the OWASP guidelines, please let us know.&lt;br /&gt;
&lt;br /&gt;
==== Platinum Sponsors (3 max) ==== &lt;br /&gt;
&lt;br /&gt;
* Largest booth area, where you can put up a &amp;quot;roll up&amp;quot; poster or two, and even a &amp;quot;pop-up&amp;quot; style booth (space permitting) to hand out your brochures and freebies. &lt;br /&gt;
&lt;br /&gt;
* Prime booth location and first choice. &lt;br /&gt;
&lt;br /&gt;
* Largest logo on the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Explicit mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
* Price: $2500 USD&lt;br /&gt;
&lt;br /&gt;
==== Gold Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Good booth location and early choice. &lt;br /&gt;
&lt;br /&gt;
* Large logo near the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. (??) &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Collective mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
* Price: $1800 USD&lt;br /&gt;
&lt;br /&gt;
==== Silver Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A small table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Smaller logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Recognition in some conference literature. &lt;br /&gt;
&lt;br /&gt;
* Passive mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
* Price: $900 USD&lt;br /&gt;
&lt;br /&gt;
==== Community Supporters ==== &lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Community Supporter&amp;quot; level of sponsorship is intended for non-profits, government offices, small startups, and other organizations with limited finances, but wish to show their support for the local OWASP chapter. &lt;br /&gt;
&lt;br /&gt;
* Small logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Community Supporters do not get a booth or table at the sponsor's display area, but you can leave a stack of fliers or swag at a central table. &lt;br /&gt;
&lt;br /&gt;
* Price: $500 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Don't Get ===&lt;br /&gt;
* List of people registering or attending. You can collect these by yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What We Need Your Money For ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly not-for-profit. We use the sponsorship funds to help make our events even more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.   &lt;br /&gt;
&lt;br /&gt;
Each year, our costs to hold the conference keep rising. Last year, the annual conference drew 50% more people than we expected, and the expenses rose accordingly. Thus we are required to raise the sponsorship fees accordingly, as compared to previous years. &lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - recording presentations enables them to be available also to people who cannot make it to the conference, and further publicize the contents of the event. &lt;br /&gt;
&lt;br /&gt;
* '''Venue costs''' - this year's conference is being hosted in partnership with the IDC, so we have minimal direct costs for use of the halls. However there are additional associated costs, for some of the involved logistics such as hiring required equipment. &lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that professional networking and getting to know each other is an important facet of the community, and name tags make this easier.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Till now, our events are publicized mostly by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to hand out certain printed materials in our conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to hear about it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What Should You Prepare as a Sponsor ===&lt;br /&gt;
As a sponsor, you are not obliged to do anything. Sponsorship can be a philanthropy. However, in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page. (Note the maximum logo size according to the sponsorship level). &lt;br /&gt;
&lt;br /&gt;
* Prepare a roll-up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want to hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further details contact [mailto:orysegal@gmail.com Ory Segal].&lt;br /&gt;
&lt;br /&gt;
== Not-for-Profit / Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related not-for-profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:douglen@hotmail.com AviD] for further details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host or sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host at least 150 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact [mailto:douglen@hotmail.com AviD].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178684</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178684"/>
				<updated>2014-07-13T14:15:44Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Commercial Sponsoring an OWASP IL conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]  &lt;br /&gt;
&lt;br /&gt;
OWASP is an open source, non-profit organization. While our activities are free for all, we do have costs, and need your help to make our activities better. &amp;lt;br&amp;gt;&lt;br /&gt;
We are also open to any other non-financial sponsorship ideas that you may have. These are some simple ways in which you can help us:   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference == &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israel chapter hosts a Regional Conference once a year, usually in September or October. This year as in previous years, we are holding the Conference in partnership with the Efi Arazi Computer Science School at the the Interdisciplinary Center (IDC) Herzliya. [[Israel#Previous_OWASP_Israel_Conferences_and_Meetings|These conferences]] are always very successful and a large number of people attend.&lt;br /&gt;
&lt;br /&gt;
We encourage companies to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Since the conferences draw an increasingly large number of people, our expenses are also rising accordingly.    &lt;br /&gt;
&lt;br /&gt;
If you or your company benefits from OWASP materials and/or conferences, we encourage you to support us! Moreover, the associated publicity and community goodwill can go a long way. We have several levels of sponsorship available, appropriate for the different organizations that wish to support our activities. Of course, if you are a Corporate Member of OWASP (at any level) and allocate a percentage (20-40%) of your membership fees to the Israel chapter, we can consider those funds as conference sponsorship.  It is also possible to be creative and find non-financial ways to support us and contribute to the successful running of the conference. (If you have ideas please contact [mailto:douglen@hotmail.com AviD] directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Check Point, Microsoft, F5, IBM, Breach Security, Ernst &amp;amp; Young, Comsec, Checkmarx, Imperva, Quotium, Akamai, and many others'''&lt;br /&gt;
&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Get for Sponsoring ===&lt;br /&gt;
All sponsors, regardless of sponsorship level receive the following: &lt;br /&gt;
&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* Access to all the tools, guides, and libraries OWASP makes available for everybody - if you benefit from these, support the organization! &lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* In general, if there is something else specific that you may want, and is within the OWASP guidelines, please let us know.&lt;br /&gt;
&lt;br /&gt;
==== Platinum Sponsors (3 max) ==== &lt;br /&gt;
&lt;br /&gt;
* Largest booth area, where you can put up a &amp;quot;roll up&amp;quot; poster or two, and even a &amp;quot;pop-up&amp;quot; style booth (space permitting) to hand out your brochures and freebies. &lt;br /&gt;
&lt;br /&gt;
* Prime booth location and first choice. &lt;br /&gt;
&lt;br /&gt;
* Largest logo on the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Explicit mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
* Price: $2500 USD&lt;br /&gt;
&lt;br /&gt;
==== Gold Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Good booth location and early choice. &lt;br /&gt;
&lt;br /&gt;
* Large logo near the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. (??) &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Collective mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
* Price: $1800 USD&lt;br /&gt;
&lt;br /&gt;
==== Silver Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A small table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Smaller logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Recognition in some conference literature. &lt;br /&gt;
&lt;br /&gt;
* Passive mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
* Price: $900 USD&lt;br /&gt;
&lt;br /&gt;
==== Community Supporters ==== &lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Community Supporter&amp;quot; level of sponsorship is intended for non-profits, government offices, small startups, and other organizations with limited finances, but wish to show their support for the local OWASP chapter. &lt;br /&gt;
&lt;br /&gt;
* Small logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Community Supporters do not get a booth or table at the sponsor's display area, but you can leave a stack of fliers or swag at a central table. &lt;br /&gt;
&lt;br /&gt;
* Price: $500 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Don't Get ===&lt;br /&gt;
* List of people registering or attending. You can collect these by yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What We Need Your Money For ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly not-for-profit. We use the sponsorship funds to help make our events even more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.   &lt;br /&gt;
&lt;br /&gt;
Each year, our costs to hold the conference keep rising. Last year, the annual conference drew 50% more people than we expected, and the expenses rose accordingly. Thus we are required to raise the sponsorship fees accordingly, as compared to previous years. &lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - recording presentations enables them to be available also to people who cannot make it to the conference, and further publicize the contents of the event. &lt;br /&gt;
&lt;br /&gt;
* '''Venue costs''' - this year's conference is being hosted in partnership with the IDC, so we have minimal direct costs for use of the halls. However there are additional associated costs, for some of the involved logistics such as hiring required equipment. &lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that professional networking and getting to know each other is an important facet of the community, and name tags make this easier.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Till now, our events are publicized mostly by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to hand out certain printed materials in our conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to hear about it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What Should You Prepare as a Sponsor ===&lt;br /&gt;
As a sponsor, you are not obliged to do anything. Sponsorship can be a philanthropy. However, in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page. (Note the maximum logo size according to the sponsorship level). &lt;br /&gt;
&lt;br /&gt;
* Prepare a roll-up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want to hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further details contact [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
&lt;br /&gt;
== Not-for-Profit / Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related not-for-profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:douglen@hotmail.com AviD] for further details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host or sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host at least 150 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact [mailto:douglen@hotmail.com AviD].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178683</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=178683"/>
				<updated>2014-07-13T14:14:19Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Platinum Sponsors (3 max) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]  &lt;br /&gt;
&lt;br /&gt;
OWASP is an open source, non-profit organization. While our activities are free for all, we do have costs, and need your help to make our activities better. &amp;lt;br&amp;gt;&lt;br /&gt;
We are also open to any other non-financial sponsorship ideas that you may have. These are some simple ways in which you can help us:   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference == &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israel chapter hosts a Regional Conference once a year, usually in September or October. This year as in previous years, we are holding the Conference in partnership with the Efi Arazi Computer Science School at the the Interdisciplinary Center (IDC) Herzliya. [[Israel#Previous_OWASP_Israel_Conferences_and_Meetings|These conferences]] are always very successful and a large number of people attend.&lt;br /&gt;
&lt;br /&gt;
We encourage companies to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Since the conferences draw an increasingly large number of people, our expenses are also rising accordingly.    &lt;br /&gt;
&lt;br /&gt;
If you or your company benefits from OWASP materials and/or conferences, we encourage you to support us! Moreover, the associated publicity and community goodwill can go a long way. We have several levels of sponsorship available, appropriate for the different organizations that wish to support our activities. Of course, if you are a Corporate Member of OWASP (at any level) and allocate a percentage (20-40%) of your membership fees to the Israel chapter, we can consider those funds as conference sponsorship.  It is also possible to be creative and find non-financial ways to support us and contribute to the successful running of the conference. (If you have ideas please contact [mailto:douglen@hotmail.com AviD] directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Check Point, Microsoft, F5, IBM, Breach Security, Ernst &amp;amp; Young, Comsec, Checkmarx, Imperva, Quotium, Akamai, and many others'''&lt;br /&gt;
&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Get for Sponsoring ===&lt;br /&gt;
All sponsors, regardless of sponsorship level receive the following: &lt;br /&gt;
&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* Access to all the tools, guides, and libraries OWASP makes available for everybody - if you benefit from these, support the organization! &lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* In general, if there is something else specific that you may want, and is within the OWASP guidelines, please let us know.&lt;br /&gt;
&lt;br /&gt;
==== Platinum Sponsors (3 max) ==== &lt;br /&gt;
&lt;br /&gt;
* Largest booth area, where you can put up a &amp;quot;roll up&amp;quot; poster or two, and even a &amp;quot;pop-up&amp;quot; style booth (space permitting) to hand out your brochures and freebies. &lt;br /&gt;
&lt;br /&gt;
* Prime booth location and first choice. &lt;br /&gt;
&lt;br /&gt;
* Largest logo on the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Explicit mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
* Price: $2500 USD&lt;br /&gt;
&lt;br /&gt;
==== Gold Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Good booth location and early choice. &lt;br /&gt;
&lt;br /&gt;
* Large logo near the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. (??) &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Collective mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
==== Silver Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A small table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Smaller logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Recognition in some conference literature. &lt;br /&gt;
&lt;br /&gt;
* Passive mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
==== Community Supporters ==== &lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Community Supporter&amp;quot; level of sponsorship is intended for non-profits, government offices, small startups, and other organizations with limited finances, but wish to show their support for the local OWASP chapter. &lt;br /&gt;
&lt;br /&gt;
* Small logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Community Supporters do not get a booth or table at the sponsor's display area, but you can leave a stack of fliers or swag at a central table. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Don't Get ===&lt;br /&gt;
* List of people registering or attending. You can collect these by yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What We Need Your Money For ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly not-for-profit. We use the sponsorship funds to help make our events even more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.   &lt;br /&gt;
&lt;br /&gt;
Each year, our costs to hold the conference keep rising. Last year, the annual conference drew 50% more people than we expected, and the expenses rose accordingly. Thus we are required to raise the sponsorship fees accordingly, as compared to previous years. &lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - recording presentations enables them to be available also to people who cannot make it to the conference, and further publicize the contents of the event. &lt;br /&gt;
&lt;br /&gt;
* '''Venue costs''' - this year's conference is being hosted in partnership with the IDC, so we have minimal direct costs for use of the halls. However there are additional associated costs, for some of the involved logistics such as hiring required equipment. &lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that professional networking and getting to know each other is an important facet of the community, and name tags make this easier.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Till now, our events are publicized mostly by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to hand out certain printed materials in our conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to hear about it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What Should You Prepare as a Sponsor ===&lt;br /&gt;
As a sponsor, you are not obliged to do anything. Sponsorship can be a philanthropy. However, in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page. (Note the maximum logo size according to the sponsorship level). &lt;br /&gt;
&lt;br /&gt;
* Prepare a roll-up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want to hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further details contact [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Not-for-Profit / Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related not-for-profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:douglen@hotmail.com AviD] for further details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host or sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host at least 150 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact [mailto:douglen@hotmail.com AviD].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_IL_2013_Sponsors&amp;diff=159448</id>
		<title>Template:OWASP IL 2013 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_IL_2013_Sponsors&amp;diff=159448"/>
				<updated>2013-09-30T06:49:01Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;[[File:GoldIL.png]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.idc.ac.il https://www.owasp.org/images/f/f1/OWASP_IL_Sponsors_IDC_New.JPG]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.quotium.com https://www.owasp.org/images/5/56/LogoQuotium.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.ey.com https://www.owasp.org/images/3/34/EY-IL.jpg]  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.imperva.com https://www.owasp.org/images/8/89/OWASP_IL_Sponsors_Imperva.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.trusteer.com https://www.owasp.org/images/1/1b/TrusteerIL.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.akamai.com https://www.owasp.org/images/9/93/Akamai_logoIL.gif]&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:SilverIL.png]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.appsec-labs.com https://www.owasp.org/images/2/24/AppSecLabsIL.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.grsee.co.il https://www.owasp.org/images/0/0d/GRSEEIL.jpg]&lt;br /&gt;
| &amp;amp;nbsp; [http://www.komodosec.com/ https://www.owasp.org/images/0/03/Komodo-small.jpg]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_2&amp;diff=55404</id>
		<title>Global Chapter Committee - Application 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_2&amp;diff=55404"/>
				<updated>2009-02-24T18:10:59Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;[[User:Mchalmers|Matthew Chalmers]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|DC Chapter member, Certification Project participant, Requirements Project Interim PM, Milwaukee Chapter Leader (being organised)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Chapters Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matt Tesauro&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Global Projects Committee, OWASP Live CD project lead&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|From my interaction with him at the Portugal Summit, I'm sure he would be a great addition to the chapters committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Nick Farwig, Senior Consultant, Deloitte &amp;amp; Touche LLP&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I've worked with Matt as client at Rockwell Automation, and he would be a great addition to any committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ory Segal, Security Products Architect, IBM&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Member, Contributor&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I had the pleasure and opportunity to work with Matt (as a client) in the past. I believe he would be a valuable addition to the committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38372</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38372"/>
				<updated>2008-09-04T13:06:49Z</updated>
		
		<summary type="html">&lt;p&gt;Orysegal: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Time and Location ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be held on September 14th at the Interdisciplinary Center Herzliya from 8:30 to 17:00. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
You can find the IDC on&lt;br /&gt;
[http://local.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=%D7%94%D7%9E%D7%A8%D7%9B%D7%96+%D7%94%D7%91%D7%99%D7%9F+%D7%AA%D7%97%D7%95%D7%9E%D7%99+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+Israel&amp;amp;sll=32.166567,34.812605&amp;amp;sspn=0.007974,0.019312&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;geocode=FbD26gEdeo0TAg&amp;amp;ll=32.177047,34.835844&amp;amp;spn=0.007973,0.019312&amp;amp;z=16&amp;amp;iwloc=addr  Google map] or use the [http://portal.idc.ac.il/he/Main/about_idc/campus_tour/Pages/MapsDirections.aspx instructions] on the IDC web site. Signs at the Campus will lead you the conference halls.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
The conference is '''free and open to all''', but please register by sending an e-mail to me at ofer@shezaf.com. We need to know how many people will arrive in order to be prepared.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
(Not final, minor changes and additions possible)&lt;br /&gt;
&lt;br /&gt;
{|   class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with   [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]]   V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-   style=&amp;quot;background-color:#000000;font-size:11pt;font-weight:bold;color:#FFFFFF&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;315&amp;quot;   height=&amp;quot;16&amp;quot; | Title&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;156&amp;quot; | Presentation&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;91&amp;quot; | Copmany&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework   rootkits - backdoors inside your Framework]]&lt;br /&gt;
&lt;br /&gt;
 |   Erez Metula&lt;br /&gt;
&lt;br /&gt;
 |   2Bsecure&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]]&lt;br /&gt;
&lt;br /&gt;
 |   Ivan Ristic&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Trends in Web Hacking: What's hot in 2008]&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Shezaf&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]]&lt;br /&gt;
&lt;br /&gt;
 |   Amichai Shulman&lt;br /&gt;
&lt;br /&gt;
 |   Imperva&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]]&lt;br /&gt;
&lt;br /&gt;
 |   Yuli Stremovsky&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Roser|eVoting]]&lt;br /&gt;
&lt;br /&gt;
 |   Dr. Alon Roser&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]]&lt;br /&gt;
&lt;br /&gt;
 |   Adi Sharabani  &amp;amp; Yinnon Haviv&lt;br /&gt;
&lt;br /&gt;
 |   IBM&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Maor&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]]&lt;br /&gt;
&lt;br /&gt;
 |   Shai Chen&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]]&lt;br /&gt;
&lt;br /&gt;
 |   Prof. Amir Herzberg&lt;br /&gt;
&lt;br /&gt;
 |   Bar Ilan Univeristy&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]]&lt;br /&gt;
&lt;br /&gt;
 |   Ronen Bachar&lt;br /&gt;
&lt;br /&gt;
 |   IBM&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&lt;br /&gt;
&lt;br /&gt;
 |   Maty Siman&lt;br /&gt;
&lt;br /&gt;
 |   Checkmarx&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]]&lt;br /&gt;
&lt;br /&gt;
 |   Dr. David Movshovitz&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;16&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]]&lt;br /&gt;
&lt;br /&gt;
 |   Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that the [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] is still open for submissions.&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>Orysegal</name></author>	</entry>

	</feed>