<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rsnake</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rsnake"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rsnake"/>
		<updated>2026-05-22T00:09:34Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187063</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187063"/>
				<updated>2014-12-15T17:50:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
=== Preface ===&lt;br /&gt;
&lt;br /&gt;
This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program1. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.&lt;br /&gt;
&lt;br /&gt;
The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability.&lt;br /&gt;
&lt;br /&gt;
A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to:&lt;br /&gt;
#The number of vulnerabilities present in an application&lt;br /&gt;
#The time to fix vulnerabilities&lt;br /&gt;
#The remediation rate of vulnerabilities&lt;br /&gt;
#The time vulnerabilities remain open&lt;br /&gt;
&lt;br /&gt;
The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas.&lt;br /&gt;
&lt;br /&gt;
=== Audience ===&lt;br /&gt;
The intended audience of this document is anyone from security engineers, developers, program managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions and answers that should be asked by those who are in charge of the application security program in your organization, this includes those responsible for managing the risk of the entire organization.&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
''''' **Key Activities: ''''' 	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
Setting up an effective application security program does require commitment from all elements of the business, and a clear understanding of what resources need to be protected and what level of risk is acceptable. However, given that information, setting up an application security program need not be confusing, difficult, or complex. The keys to success involve planning, making key financial decisions, ensuring all roles and responsibilities are clearly assigned and that all stakeholders within the organization know what to expect.&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187062</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187062"/>
				<updated>2014-12-15T17:50:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
=== Preface ===&lt;br /&gt;
&lt;br /&gt;
This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program1. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.&lt;br /&gt;
&lt;br /&gt;
The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability.&lt;br /&gt;
&lt;br /&gt;
A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to:&lt;br /&gt;
#The number of vulnerabilities present in an application&lt;br /&gt;
#The time to fix vulnerabilities&lt;br /&gt;
#The remediation rate of vulnerabilities&lt;br /&gt;
#The time vulnerabilities remain open&lt;br /&gt;
&lt;br /&gt;
The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas.&lt;br /&gt;
&lt;br /&gt;
=== Audience ===&lt;br /&gt;
The intended audience of this document is anyone from security engineers, developers, program managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions and answers that should be asked by those who are in charge of the application security program in your organization, this includes those responsible for managing the risk of the entire organization.&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
''''' **Key Activities: ''''' 	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
Setting up an effective application security program does require commitment from all elements of the business, and a clear understanding of what resources need to be protected and what level of risk is acceptable. However, given that information, setting up an application security program need not be confusing, difficult, or complex. The keys to success involve planning, making key financial decisions, ensuring all roles and responsibilities are clearly assigned and that all stakeholders within the organization know what to expect.&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187061</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187061"/>
				<updated>2014-12-15T17:49:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
=== Preface ===&lt;br /&gt;
&lt;br /&gt;
This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program1. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.&lt;br /&gt;
&lt;br /&gt;
The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability.&lt;br /&gt;
&lt;br /&gt;
A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to:&lt;br /&gt;
#The number of vulnerabilities present in an application&lt;br /&gt;
#The time to fix vulnerabilities&lt;br /&gt;
#The remediation rate of vulnerabilities&lt;br /&gt;
#The time vulnerabilities remain open&lt;br /&gt;
&lt;br /&gt;
The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas.&lt;br /&gt;
&lt;br /&gt;
=== Audience ===&lt;br /&gt;
The intended audience of this document is anyone from security engineers, developers, program managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions and answers that should be asked by those who are in charge of the application security program in your organization, this includes those responsible for managing the risk of the entire organization.&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
''''' **Key Activities: ''''' 	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187060</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187060"/>
				<updated>2014-12-15T17:48:55Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Contents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
=== Preface ===&lt;br /&gt;
&lt;br /&gt;
This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program1. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.&lt;br /&gt;
&lt;br /&gt;
The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability.&lt;br /&gt;
&lt;br /&gt;
A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to:&lt;br /&gt;
#The number of vulnerabilities present in an application&lt;br /&gt;
#The time to fix vulnerabilities&lt;br /&gt;
#The remediation rate of vulnerabilities&lt;br /&gt;
#The time vulnerabilities remain open&lt;br /&gt;
&lt;br /&gt;
The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas.&lt;br /&gt;
&lt;br /&gt;
=== Audience ===&lt;br /&gt;
The intended audience of this document is anyone from security engineers, developers, program managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions and answers that should be asked by those who are in charge of the application security program in your organization, this includes those responsible for managing the risk of the entire organization.&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
''''' **Key Activities: ''''' 	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187059</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187059"/>
				<updated>2014-12-15T17:46:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
''''' **Key Activities: ''''' 	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187058</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=187058"/>
				<updated>2014-12-15T17:45:07Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==	&lt;br /&gt;
*Evaluation	&lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development&lt;br /&gt;
&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_1&amp;diff=187057</id>
		<title>Day 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_1&amp;diff=187057"/>
				<updated>2014-12-15T17:44:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;== Key Activities == === Evaluation === *Dedicate time to understanding the “lay of the land” and the key players, along with their objectives and motivations. *Spend time...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities ==&lt;br /&gt;
=== Evaluation ===&lt;br /&gt;
*Dedicate time to understanding the “lay of the land” and the key players, along with their objectives and motivations.&lt;br /&gt;
*Spend time with the parts of the organization that you are least familiar with.&lt;br /&gt;
*Identify the security mandate as defined by the business/management.&lt;br /&gt;
*Identify how IT Operations align with the security mandate.&lt;br /&gt;
*Be alert to your existing biases.&lt;br /&gt;
&lt;br /&gt;
== Key Questions ==&lt;br /&gt;
&lt;br /&gt;
=== Management ===&lt;br /&gt;
'''''Has the business defined an internal security mandate?'''''&lt;br /&gt;
Business drivers may originate from legal or industry compliance obligations, internal policy, or customer or partner&lt;br /&gt;
requirements. All actions and activities in the Application Security program should tie back to specific business&lt;br /&gt;
obligations. If there is no business mandate, a case must be made to the business that an application security program is necessary. There are a number of industry statistical reports and benchmarks available that address what other, similar organizations have implemented and why.&lt;br /&gt;
&lt;br /&gt;
'''''What are the current and planned human and financial resources dedicated to Application Security?'''''&lt;br /&gt;
If resources are currently dedicated to ensuring the integrity of applications, examine the current allocation of those resources against their outcomes. The goal is to ensure that in a world of limited resources, each activity is measured for actual efficacy.&lt;br /&gt;
&lt;br /&gt;
If there are few or no resources allocated to ensuring the integrity of applications, the case must be made by&lt;br /&gt;
leveraging data relevant to the organization that can be quantified in financial terms. Building a formal business case is the most effective way to approach the problem. The case must address the needs as they apply to existing business objectives. This is not the time for expounding on the virtues of security. You must translate the business benefit of reallocating financial resources. Simply asking for X number of dollars to reduce Y number of vulnerabilities is typically ineffective.&lt;br /&gt;
&lt;br /&gt;
'''''What are the IT &amp;amp; Business priorities?'''''&lt;br /&gt;
IT is both an enabler and supporter of the business. Security is no different in this respect; however, it has the added challenge of needing to be transparent where it can be, and be a part of the ordinary workflow, or be perceived as a roadblock. Once the business priorities have been identified, the application security goals must be aligned with&lt;br /&gt;
those priorities. If the business priorities are to release new functionality at a rapid pace, then application testing must keep pace; if the priorities are to maintain the user experience over a long period of time, a pplication testing must be rigorous before the user is ever exposed to the application.&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
'''''What is the overall security budget and the priorities of that budget?'''''&lt;br /&gt;
'''''What percentage of that budget is allocated to Application Security?'''''&lt;br /&gt;
Most departments will feel under budget to some degree. Examine the overall security budget (including cyberinsurance&lt;br /&gt;
budget if possible, as it likely falls outside of the security budget) to understand what receives financial priority and how the Application Security program could benefit from those activities. If there is significant spend on security infrastructure, ensure that they are leveraging controls to protect applications -- for example, alerting on the lack or improper use of security headers.&lt;br /&gt;
&lt;br /&gt;
'''''Which of your assets are most frequently attacked?'''''&lt;br /&gt;
Not all attacks are equal, and not all attacks are opportunistic. Careful examination of attack frequency and velocity&lt;br /&gt;
can identify the assets requiring additional testing to ensure resiliency. Often, low(er) priority assets will be targeted for exploitation as they tend not be as resilient to attacks.&lt;br /&gt;
&lt;br /&gt;
'''''What security tools and/or services do you as a company currently own/use?'''''&lt;br /&gt;
Query other parts of the security organization to understand what tools and services they already have access to. Software and services are often bundled in contracts but not used as they were not the primary purpose for purchase.&lt;br /&gt;
If the QA team already has access to security tools that were bundled as part of their QA software acquisition there are opportunities to leverage that existing financial commitment and even allow for native integration.&lt;br /&gt;
&lt;br /&gt;
=== IT Operations ===&lt;br /&gt;
'''''What are your assets?'''''&lt;br /&gt;
Include assets you own and assets hosted or owned by third parties. Unknown or unmanaged assets cannot be protected. It is also difficult to fix issues if the person or team responsible for those assets is unknown. Developing an accurate and update-to-date asset inventory can be challenging, however, for the purpose of this exercise we will be focusing on web-based assets. The narrowed scope can be aggressively targeted and maintained.&lt;br /&gt;
&lt;br /&gt;
'''''How are web assets isolated and distributed throughout the infrastructure?'''''&lt;br /&gt;
If an attacker were able to compromise a machine (say a webserver, or a database server) what would prevent them from pivoting and hacking into other nearby machines? Are they physically isolated, logically isolated, or do they share similar credentials, etc?&lt;br /&gt;
&lt;br /&gt;
'''''How frequently do you perform network and server vulnerability scans?'''''&lt;br /&gt;
Addressing web application vulnerabilities on a server that never patches its operating system is a waste of resources. Understand how often infrastructure is assessed and patched – this should match or exceed the pac e of attack frequency.&lt;br /&gt;
&lt;br /&gt;
'''''What is your tolerance around production safety?'''''&lt;br /&gt;
Some environments are more sensitive to production testing, as there is always some likelihood of impact; the goal is to get the likelihood of impact as close to zero as possible. As the likelihood of impact approaches zero, the frequency of testing should be increased. Ultimately, production systems are the primary targets of our adversaries – they should be tested as often as possible; at a minimum, at least as frequently as the application itself is changed or updated.&lt;br /&gt;
&lt;br /&gt;
=== Engineering Groups (including QA and Software Development) ===&lt;br /&gt;
'''''According to the software development group’s understanding of the current processes, whose responsibility is application security?'''''&lt;br /&gt;
Security lives in our corporate cultures and psyche. Developers are ultimately responsible for their code; understand&lt;br /&gt;
whether they also believe they are responsible for the integrity of that code. Security is not the sole responsibility of either the developer community or the security department. Foster a healthy environment of mutual responsibility and accountability from all stakeholders. Begin by sharing information in a non-aggressive manner.&lt;br /&gt;
&lt;br /&gt;
'''''Where does Security fit into the software development lifecycle?'''''&lt;br /&gt;
If a development lifecycle does not exist, the first priority is to demonstrate the business value of having a defined process. Most organizations will have some process in place, even if it is an immature one. The absence of a development process could also prove to be an opportunity to ensure security is built into a process from the start.&lt;br /&gt;
&lt;br /&gt;
Roughly, the steps to building or updating software can be generalized as:&lt;br /&gt;
#Planning / Analysis&lt;br /&gt;
#Design&lt;br /&gt;
#Implementation&lt;br /&gt;
#Testing&lt;br /&gt;
#Maintain&lt;br /&gt;
#Decommission&lt;br /&gt;
&lt;br /&gt;
Let’s break down each step and discuss basic security activities that are often considered to reduce risk.&lt;br /&gt;
&lt;br /&gt;
'''Planning / Analysis:''' Ensure business analysts and stakeholders have considered and can detail the security needs and risk tolerance of an application. This may reference internal data classification policies to describe the data sensitivity. Threat modeling may also help clarify the potential threat agents who may be motivated to attack the proposed application.&lt;br /&gt;
&lt;br /&gt;
'''Design:''' A security architecture review may reveal security design flaws in key areas such as authentication, access control, or separation of concerns, and of course may identify missing categorical security controls.&lt;br /&gt;
&lt;br /&gt;
'''Implementation:''' The implementation process normally consists of the coding and development of the overall architecture design formulated in the previous phase. Developers should be receiving continuous security feedback to ensure all security issues are being identified and mitigated in conformance with the organization’s risk tolerance.&lt;br /&gt;
&lt;br /&gt;
'''Testing:''' Testing should include security tests as well as functional tests. Areas of concentration should be on vulnerabilities that would not have been uncovered during the implementation phase, such as business logic vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Maintenance:''' Once the application is promoted to production, continuous testing of security issues should be ongoing throughout the life of the application. As vulnerability vectors and attacks evolve, the application should be tested to ensure defensibility against these new attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''How are software defects documented, trended, and prioritized?'''''&lt;br /&gt;
The key to adoption of an Application Security program is alignment with and transparency to current workflows. Identify how application defects are documented, trended and prioritized, and plan to insert the application security defects into these existing documents and processes.&lt;br /&gt;
&lt;br /&gt;
'''''Are developers encouraged to develop secure code?'''''&lt;br /&gt;
Positive incentive programs foster ownership and accountability for output. Corporate culture varies from each organization; tapping into that culture to offer incentives for producing rugged code will create a natural momentum for finding and fixing security issues. Some cultures will value access to otherwise less accessible personnel, such as lunch with the CTO; others will be motivated by gifts that they might not have purchased for themselves, such as a robotics kit. Take the time to understand the culture of your organization and tap into the inherent desire most people have to be rewarded. Remember that money does not motivate everyone, and can even be demotivating in some cases.&lt;br /&gt;
&lt;br /&gt;
'''''Are abuse and misuse cases part of test scripts?'''''&lt;br /&gt;
Test scripts are often developed for the sole purpose of ensuring the application performs the intended functionality.&lt;br /&gt;
Introduce test scripts that could identify the misuse of intended functionality, such as the ability to execute similar functionality a user should not be able to access.&lt;br /&gt;
&lt;br /&gt;
'''''Is everyone in the organization expected to have general software security knowledge or is there a team/individual&lt;br /&gt;
tasked with being the &amp;quot;Security Deputy&amp;quot;?''''&lt;br /&gt;
Security deputy programs are a good approach to disseminating application security information to non-security&lt;br /&gt;
focused departments; they also have the added bonus of fostering a two-way relationship.&lt;br /&gt;
&lt;br /&gt;
Implement a deputy program that:&lt;br /&gt;
*is focused on the goals of the application developers and application security testers&lt;br /&gt;
*is aimed at achieving results beyond simple security awareness&lt;br /&gt;
*can address the points throughout the development cycle where vulnerabilities are introduced – at the time the code is written&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187056</id>
		<title>Day 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187056"/>
				<updated>2014-12-15T17:28:40Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities ==&lt;br /&gt;
*Become intimately familiar with what you are meant to protect and at what level.&lt;br /&gt;
*Define processes, procedures, and checklists to align assessment strategies to business needs.&lt;br /&gt;
*Effectively communicate the introduction and goals of the Application Security assessment program.&lt;br /&gt;
*Provide a single point of contact for the program.&lt;br /&gt;
&lt;br /&gt;
== Asset Discovery ==&lt;br /&gt;
*Gather Internal, External and Hosted IP ranges.&lt;br /&gt;
*Catalogue known domains and subdomains.&lt;br /&gt;
*Identify asset meta-data locations. (CMDBs, GRCs, etc.).&lt;br /&gt;
*Identify site owners, where those are not already known.&lt;br /&gt;
*Gather assessment credentials, including multiple roles for horizontal and vertical testing.&lt;br /&gt;
*Identify the rate of application change (e.g. monthly, weekly, etc.…)&lt;br /&gt;
&lt;br /&gt;
== Asset Risk Prioritization ==&lt;br /&gt;
*Develop or leverage existing methodology for stack ranking the value of your assets to the business based on&lt;br /&gt;
impact to confidentiality, integrity and availability (C.I.A.). (See: [http://csrc.nist.gov/publications/fips/fips199/FIPSPUB-199-final.pdf])&lt;br /&gt;
&lt;br /&gt;
POTENTIAL IMPACT&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!SECURITY OBJECTIVE&lt;br /&gt;
!LOW&lt;br /&gt;
!MODERATE&lt;br /&gt;
!HIGH&lt;br /&gt;
|-&lt;br /&gt;
|Confidentiality&lt;br /&gt;
Preserving authorized restrictions on information&lt;br /&gt;
access and disclosure, including means for protecting&lt;br /&gt;
personal privacy and proprietary information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Integrity&lt;br /&gt;
Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation&lt;br /&gt;
and authenticity. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a serious adverse effect on&lt;br /&gt;
organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Availability&lt;br /&gt;
Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Map asset criticality against attacker profiles with use of a GRC (Governance Risk Management and Compliance) tool if available, or using an information asset register such as the University of Oxford Information Asset Register Tool&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
#Tier 1 = Targeted Govt./State sponsor.&lt;br /&gt;
#Tier 2 = Hactivism&lt;br /&gt;
#Tier 3 = Random Opportunistic&lt;br /&gt;
&lt;br /&gt;
*Implement ISO 17799: Asset Management or similar standard to improve governance of application assets.&lt;br /&gt;
&lt;br /&gt;
== Communication Plan ==&lt;br /&gt;
*Set expectations of assessment program for all interested parties.&lt;br /&gt;
*Alert Operations team of upcoming activities.&lt;br /&gt;
*Gather written buy-in from application stakeholders for the assessment activities.&lt;br /&gt;
*Develop, publish, and maintain comprehensive application security and privacy standards, policies, procedures and guidelines and enforce these in compliance with relevant global regulations and standards.&lt;br /&gt;
*Define, document and share application business continuity and incident response plan. (Business Continuity Plan Resources: ITIL, COBIT, NIST)&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187055</id>
		<title>Day 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187055"/>
				<updated>2014-12-15T17:28:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities ==&lt;br /&gt;
*Become intimately familiar with what you are meant to protect and at what level.&lt;br /&gt;
*Define processes, procedures, and checklists to align assessment strategies to business needs.&lt;br /&gt;
*Effectively communicate the introduction and goals of the Application Security assessment program.&lt;br /&gt;
*Provide a single point of contact for the program.&lt;br /&gt;
&lt;br /&gt;
== Asset Discovery ==&lt;br /&gt;
*Gather Internal, External and Hosted IP ranges.&lt;br /&gt;
*Catalogue known domains and subdomains.&lt;br /&gt;
*Identify asset meta-data locations. (CMDBs, GRCs, etc.).&lt;br /&gt;
*Identify site owners, where those are not already known.&lt;br /&gt;
*Gather assessment credentials, including multiple roles for horizontal and vertical testing.&lt;br /&gt;
*Identify the rate of application change (e.g. monthly, weekly, etc.…)&lt;br /&gt;
&lt;br /&gt;
== Asset Risk Prioritization ==&lt;br /&gt;
*Develop or leverage existing methodology for stack ranking the value of your assets to the business based on&lt;br /&gt;
impact to confidentiality, integrity and availability (C.I.A.). (See: [http://csrc.nist.gov/publications/fips/fips199/FIPSPUB-199-final.pdf])&lt;br /&gt;
&lt;br /&gt;
POTENTIAL IMPACT&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!SECURITY OBJECTIVE&lt;br /&gt;
!LOW&lt;br /&gt;
!MODERATE&lt;br /&gt;
!HIGH&lt;br /&gt;
|-&lt;br /&gt;
|Confidentiality&lt;br /&gt;
Preserving authorized restrictions on information&lt;br /&gt;
access and disclosure, including means for protecting&lt;br /&gt;
personal privacy and proprietary information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Integrity&lt;br /&gt;
Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation&lt;br /&gt;
and authenticity. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a serious adverse effect on&lt;br /&gt;
organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Availability&lt;br /&gt;
Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Map asset criticality against attacker profiles with use of a GRC (Governance Risk Management and Compliance) tool if available, or using an information asset register such as the University of Oxford Information Asset Register Tool&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
**Tier 1 = Targeted Govt./State sponsor.&lt;br /&gt;
**Tier 2 = Hactivism&lt;br /&gt;
**Tier 3 = Random Opportunistic&lt;br /&gt;
&lt;br /&gt;
*Implement ISO 17799: Asset Management or similar standard to improve governance of application assets.&lt;br /&gt;
&lt;br /&gt;
== Communication Plan ==&lt;br /&gt;
*Set expectations of assessment program for all interested parties.&lt;br /&gt;
*Alert Operations team of upcoming activities.&lt;br /&gt;
*Gather written buy-in from application stakeholders for the assessment activities.&lt;br /&gt;
*Develop, publish, and maintain comprehensive application security and privacy standards, policies, procedures and guidelines and enforce these in compliance with relevant global regulations and standards.&lt;br /&gt;
*Define, document and share application business continuity and incident response plan. (Business Continuity Plan Resources: ITIL, COBIT, NIST)&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187054</id>
		<title>Day 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187054"/>
				<updated>2014-12-15T17:27:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities ==&lt;br /&gt;
*Become intimately familiar with what you are meant to protect and at what level.&lt;br /&gt;
*Define processes, procedures, and checklists to align assessment strategies to business needs.&lt;br /&gt;
*Effectively communicate the introduction and goals of the Application Security assessment program.&lt;br /&gt;
*Provide a single point of contact for the program.&lt;br /&gt;
&lt;br /&gt;
== Asset Discovery ==&lt;br /&gt;
*Gather Internal, External and Hosted IP ranges.&lt;br /&gt;
*Catalogue known domains and subdomains.&lt;br /&gt;
*Identify asset meta-data locations. (CMDBs, GRCs, etc.).&lt;br /&gt;
*Identify site owners, where those are not already known.&lt;br /&gt;
*Gather assessment credentials, including multiple roles for horizontal and vertical testing.&lt;br /&gt;
*Identify the rate of application change (e.g. monthly, weekly, etc.…)&lt;br /&gt;
&lt;br /&gt;
== Asset Risk Prioritization ==&lt;br /&gt;
*Develop or leverage existing methodology for stack ranking the value of your assets to the business based on&lt;br /&gt;
impact to confidentiality, integrity and availability (C.I.A.). (See: [http://csrc.nist.gov/publications/fips/fips199/FIPSPUB-199-final.pdf])&lt;br /&gt;
&lt;br /&gt;
POTENTIAL IMPACT&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!SECURITY OBJECTIVE&lt;br /&gt;
!LOW&lt;br /&gt;
!MODERATE&lt;br /&gt;
!HIGH&lt;br /&gt;
|-&lt;br /&gt;
|Confidentiality&lt;br /&gt;
Preserving authorized restrictions on information&lt;br /&gt;
access and disclosure, including means for protecting&lt;br /&gt;
personal privacy and proprietary information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Integrity&lt;br /&gt;
Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation&lt;br /&gt;
and authenticity. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a serious adverse effect on&lt;br /&gt;
organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Availability&lt;br /&gt;
Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Map asset criticality against attacker profiles with use of a GRC* (Governance Risk Management and Compliance) tool if available, or using an information asset register such as the University of Oxford Information Asset Register Tool&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
**Tier 1 = Targeted Govt./State sponsor.&lt;br /&gt;
**Tier 2 = Hactivism&lt;br /&gt;
**Tier 3 = Random Opportunistic&lt;br /&gt;
&lt;br /&gt;
*Implement ISO 17799: Asset Management or similar standard to improve governance of application assets.&lt;br /&gt;
&lt;br /&gt;
== Communication Plan ==&lt;br /&gt;
*Set expectations of assessment program for all interested parties.&lt;br /&gt;
*Alert Operations team of upcoming activities.&lt;br /&gt;
*Gather written buy-in from application stakeholders for the assessment activities.&lt;br /&gt;
*Develop, publish, and maintain comprehensive application security and privacy standards, policies, procedures and guidelines and enforce these in compliance with relevant global regulations and standards.&lt;br /&gt;
*Define, document and share application business continuity and incident response plan. (Business Continuity Plan Resources: ITIL, COBIT, NIST)&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187053</id>
		<title>Day 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_2&amp;diff=187053"/>
				<updated>2014-12-15T17:26:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;== Key Activities == *Become intimately familiar with what you are meant to protect and at what level. *Define processes, procedures, and checklists to align assessment strate...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities ==&lt;br /&gt;
*Become intimately familiar with what you are meant to protect and at what level.&lt;br /&gt;
*Define processes, procedures, and checklists to align assessment strategies to business needs.&lt;br /&gt;
*Effectively communicate the introduction and goals of the Application Security assessment program.&lt;br /&gt;
*Provide a single point of contact for the program.&lt;br /&gt;
&lt;br /&gt;
== Asset Discovery ==&lt;br /&gt;
*Gather Internal, External and Hosted IP ranges.&lt;br /&gt;
*Catalogue known domains and subdomains.&lt;br /&gt;
*Identify asset meta-data locations. (CMDBs, GRCs, etc.).&lt;br /&gt;
*Identify site owners, where those are not already known.&lt;br /&gt;
*Gather assessment credentials, including multiple roles for horizontal and vertical testing.&lt;br /&gt;
*Identify the rate of application change (e.g. monthly, weekly, etc.…)&lt;br /&gt;
&lt;br /&gt;
== Asset Risk Prioritization ==&lt;br /&gt;
*Develop or leverage existing methodology for stack ranking the value of your assets to the business based on&lt;br /&gt;
impact to confidentiality, integrity and availability (C.I.A.). (See: [http://csrc.nist.gov/publications/fips/fips199/FIPSPUB-199-final.pdf])&lt;br /&gt;
&lt;br /&gt;
POTENTIAL IMPACT&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!SECURITY OBJECTIVE&lt;br /&gt;
!LOW&lt;br /&gt;
!MODERATE&lt;br /&gt;
!HIGH&lt;br /&gt;
|-&lt;br /&gt;
|Confidentiality&lt;br /&gt;
Preserving authorized restrictions on information&lt;br /&gt;
access and disclosure, including means for protecting&lt;br /&gt;
personal privacy and proprietary information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Integrity&lt;br /&gt;
Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation&lt;br /&gt;
and authenticity. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a serious adverse effect on&lt;br /&gt;
organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|-&lt;br /&gt;
|Availability&lt;br /&gt;
Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542]&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Map asset criticality against attacker profiles with use of a GRC* (Governance Risk Management and Compliance)&lt;br /&gt;
tool if available, or using an information asset register such as the University of Oxford Information Asset Register&lt;br /&gt;
Tool&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
*Tier 1 = Targeted Govt./State sponsor.&lt;br /&gt;
*Tier 2 = Hactivism&lt;br /&gt;
*Tier 3 = Random Opportunistic&lt;br /&gt;
&lt;br /&gt;
*Implement ISO 17799: Asset Management or similar standard to improve governance of application assets.&lt;br /&gt;
&lt;br /&gt;
== Communication Plan ==&lt;br /&gt;
*Set expectations of assessment program for all interested parties.&lt;br /&gt;
*Alert Operations team of upcoming activities.&lt;br /&gt;
*Gather written buy-in from application stakeholders for the assessment activities.&lt;br /&gt;
*Develop, publish, and maintain comprehensive application security and privacy standards, policies, procedures and&lt;br /&gt;
guidelines and enforce these in compliance with relevant global regulations and standards.&lt;br /&gt;
*Define, document and share application business continuity and incident response plan. (Business Continuity Plan Resources: ITIL, COBIT, NIST)&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_3&amp;diff=187052</id>
		<title>Day 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_3&amp;diff=187052"/>
				<updated>2014-12-15T17:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;== Key Activities ==  *Measure current vulnerability posture. *Initiate vulnerability testing. *Triage vulnerabilities.  == Vulnerability Assessments ==  To determine what sor...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key Activities == &lt;br /&gt;
*Measure current vulnerability posture.&lt;br /&gt;
*Initiate vulnerability testing.&lt;br /&gt;
*Triage vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Assessments == &lt;br /&gt;
To determine what sort of vulnerability assessment is most appropriate, consider your current status and resources:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!Scenario&lt;br /&gt;
!Appropriate Assessments&lt;br /&gt;
|-&lt;br /&gt;
|Resources and support for immediate unlimited continuous assessments&lt;br /&gt;
|Perform assessments across all discovered assets&lt;br /&gt;
|-&lt;br /&gt;
|Limited resources or appetite for unlimited continuous assessments&lt;br /&gt;
|At a minimum frequency of testing should keep or exceed rate of change in asset&lt;br /&gt;
|-&lt;br /&gt;
|Application currently exist in production environment:&lt;br /&gt;
|Begin dynamic* assessments for these existing applications&lt;br /&gt;
|-&lt;br /&gt;
|Source Code of your application(s) is available on the internet (Freely available, stolen, etc.)&lt;br /&gt;
|Begin Static Analysis assessments&lt;br /&gt;
|-&lt;br /&gt;
|Business is subject to compliance mandate requiring Static Analysis&lt;br /&gt;
|Begin Static Analysis assessments&lt;br /&gt;
|-&lt;br /&gt;
|New development project of an application Begin Static Analysis assessments&lt;br /&gt;
|Dynamic assessments completed and application security program in continuous improvement cycle&lt;br /&gt;
|-&lt;br /&gt;
|Begin Static Analysis assessments&lt;br /&gt;
|Begin Dynamic Analysis in QA/Staging&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Other scenarios to consider Static Analysis as the first assessment type or in parallel with Dynamic Analysis:&lt;br /&gt;
*High developer attrition rate&lt;br /&gt;
*Known internal bad actors&lt;br /&gt;
*Disgruntled current or former employee with access to source code&lt;br /&gt;
*Outsourced code&lt;br /&gt;
&lt;br /&gt;
== Static Analysis ==&lt;br /&gt;
Static Code Analysis (also known as Source Code Analysis or Static Application Security Testing (SAST)) is usually performed as part of a Code Review (also known as white-box testing) and is carried out at the Implementation phase of a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of Static Code Analysis tools that attempt to highlight possible vulnerabilities within ‘static’ (non-running) source code by using techniques such as Taint Analysis and Data Flow Analysis.&lt;br /&gt;
&lt;br /&gt;
== Dynamic Analysis == &lt;br /&gt;
Dynamic Application Security Testing (DAST), also referred to as “black-box” testing, identifies vulnerabilities in running web applications – testing of the application from the outside in.&lt;br /&gt;
&lt;br /&gt;
== Vulnerability delivery == &lt;br /&gt;
To deliver valuable vulnerability information to your business, you must:&lt;br /&gt;
*Document vulnerability delegation and vulnerability lifecycle process&lt;br /&gt;
*Feed issues into existing tracking systems where possible to preserve the existing workflow&lt;br /&gt;
*Triage vulnerabilities prior to feeding them into your defect management systems&lt;br /&gt;
*Ensure only true positives are fed to development teams&lt;br /&gt;
*Track re-testing of vulnerabilities via new incident/ticket or update existing incident/ticket.&lt;br /&gt;
*Define which issues are important to the business&lt;br /&gt;
*Create a baseline of the issues that are important to the business&lt;br /&gt;
*Align vulnerability remediation strategy with loss exposure versus resources available to fix&lt;br /&gt;
*Create a knowledge base of common issues and their solutions&lt;br /&gt;
*Dedicate resource(s) to developer interactions, including educating developers on security topics&lt;br /&gt;
*Publish aggregate metrics internally&lt;br /&gt;
*Match or outpace release cycles in detecting and responding to vulnerabilities.&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_4&amp;diff=186912</id>
		<title>Day 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_4&amp;diff=186912"/>
				<updated>2014-12-12T16:29:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Key Activities ==&lt;br /&gt;
*Measure and improve assessment service delivery.&lt;br /&gt;
&lt;br /&gt;
== Measured Metrics ==&lt;br /&gt;
* Compare against industry metrics and interdepartmental metrics.&lt;br /&gt;
* Compare behaviors to measured metrics to identify which initiatives drive improvement of metrics and security program.&lt;br /&gt;
== Metric Definition ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#C1D9DD;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
!Metric&lt;br /&gt;
!Definition&lt;br /&gt;
|-&lt;br /&gt;
|Number of Vulnerabilities &lt;br /&gt;
|The total count of vulnerabilities during the analysis period; valuable as a metric over time. Time Open This value represents the number of partial days since the vulnerability was opened as of the specific evaluation date. It only includes open vulnerabilities and not vulnerabilities that were closed. It is computed as the evaluation date less the open date for the vulnerability.&lt;br /&gt;
|-&lt;br /&gt;
|Time-to-Fix &lt;br /&gt;
|The Time-to-Fix is the number of partial days required to close a vulnerability. It is based on the vulnerabilities that were closed during the analysis period.&lt;br /&gt;
|-&lt;br /&gt;
|Remediation Rate&lt;br /&gt;
|The Remediation Rate is the ratio of the number of vulnerabilities closed over the number of vulnerabilities opened over a given period of time. A vulnerability is considered closed if it closed during the analysis period. A vulnerability is considered open if it was open at some time during the analysis period. Therefore, vulnerability could be counted as open and closed.&lt;br /&gt;
|-&lt;br /&gt;
|Vulnerability Class&lt;br /&gt;
|Likelihood Vulnerability Class Likelihood is the percentage of active applications that have at least one open vulnerability in a given vulnerability class over a given period of time. It is determined by counting the number of applications that have at least one open vulnerability in a given vulnerability class over the number of active applications.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_4&amp;diff=186910</id>
		<title>Day 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_4&amp;diff=186910"/>
				<updated>2014-12-12T16:25:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;= Key Activities == *Measure and improve assessment service delivery.  == Measured Metrics == * Compare against industry metrics and interdepartmental metrics. * Compare behav...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Key Activities ==&lt;br /&gt;
*Measure and improve assessment service delivery.&lt;br /&gt;
&lt;br /&gt;
== Measured Metrics ==&lt;br /&gt;
* Compare against industry metrics and interdepartmental metrics.&lt;br /&gt;
* Compare behaviors to measured metrics to identify which initiatives drive improvement of metrics and security program.&lt;br /&gt;
== Metric Definition ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#000011;&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|Number of Vulnerabilities &lt;br /&gt;
|The total count of vulnerabilities during the analysis period; valuable as a metric over time. Time Open This value represents the number of partial days since the vulnerability was opened as of the specific evaluation date. It only includes open vulnerabilities and not vulnerabilities that were closed. It is computed as the evaluation date less the open date for the vulnerability.&lt;br /&gt;
|-&lt;br /&gt;
|Time-to-Fix &lt;br /&gt;
|The Time-to-Fix is the number of partial days required to close a vulnerability. It is based on the vulnerabilities that were closed during the analysis period.&lt;br /&gt;
|-&lt;br /&gt;
|Remediation Rate&lt;br /&gt;
|The Remediation Rate is the ratio of the number of vulnerabilities closed over the number of vulnerabilities opened over a given period of time. A vulnerability is considered closed if it closed during the analysis period. A vulnerability is considered open if it was open at some time during the analysis period. Therefore, vulnerability could be counted as open and closed.&lt;br /&gt;
|-&lt;br /&gt;
|Vulnerability Class&lt;br /&gt;
|Likelihood Vulnerability Class Likelihood is the percentage of active applications that have at least one open vulnerability in a given vulnerability class over a given period of time. It is determined by counting the number of applications that have at least one open vulnerability in a given vulnerability class over the number of active applications.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_5&amp;diff=186908</id>
		<title>Day 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_5&amp;diff=186908"/>
				<updated>2014-12-12T16:20:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key activities ==&lt;br /&gt;
*Implement compensating controls &amp;amp; mitigation controls&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Compensating Controls ==&lt;br /&gt;
*Implement compensating controls to limit the likelihood of successful attacks; for example, deploy web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Mitigating Controls ==&lt;br /&gt;
*Implement mitigating controls to discover and prevent mistakes that may lead to the introduction of vulnerabilities; for example, Control 6 of the CSIS 20 Critical Security Controls – Application Software Security. Build security into the development life cycle.&lt;br /&gt;
&lt;br /&gt;
== Remediation Prioritization ==&lt;br /&gt;
*Implement remediation prioritization driven by financial calculations. Compare the cost of fixing specific&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Day_5&amp;diff=186907</id>
		<title>Day 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Day_5&amp;diff=186907"/>
				<updated>2014-12-12T16:20:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;== Key activities == *Implement compensating controls &amp;amp; mitigation controls *Remediation Prioritization  == Compensating Controls == *Implement compensating controls to limit...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key activities ==&lt;br /&gt;
*Implement compensating controls &amp;amp; mitigation controls&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Compensating Controls ==&lt;br /&gt;
*Implement compensating controls to limit the likelihood of successful attacks; for example, deploy web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Mitigating Controls ==&lt;br /&gt;
*Implement mitigating controls to discover and prevent mistakes that may lead to the introduction of vulnerabilities; for example, Control 6 of the CSIS 20 Critical Security Controls – Application Software Security. Build security into the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
== Remediation Prioritization ==&lt;br /&gt;
*Implement remediation prioritization driven by financial calculations. Compare the cost of fixing specific&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186906</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186906"/>
				<updated>2014-12-12T16:20:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
== [[Day 1]] ==&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
== [[Day 2]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
== [[Day 3]] ==&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
== [[Day 4]] ==	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186904</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186904"/>
				<updated>2014-12-12T16:19:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
[[Day 1]]&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
[[Day 2]]&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
[[Day 3]]&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
[[Day 4]]	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
== [[Day 5]] ==&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186903</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186903"/>
				<updated>2014-12-12T16:18:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* The Application Security Program Quick Start Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
[[Day 1]]&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
[[Day 2]]&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
[[Day 3]]&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
[[Day 4]]	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
[[*Day 5]]&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186893</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186893"/>
				<updated>2014-12-12T16:11:25Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Contents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
''' [[*Day 5]]'''&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186889</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186889"/>
				<updated>2014-12-12T16:05:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Contents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
[[''' *Day 5''']]	&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186888</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186888"/>
				<updated>2014-12-12T15:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Other contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
''' *Day 5'''	&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| '''Matt Johansen''']]&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186887</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186887"/>
				<updated>2014-12-12T15:58:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Project lead and authors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
''' *Day 5'''	&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs| '''Gabriel Gumbs''']]&lt;br /&gt;
* [[User:JeremiahGrossman| '''Jeremiah Grossman''']]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| MattJohansen]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186886</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186886"/>
				<updated>2014-12-12T15:58:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Project lead and authors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
''' *Day 5'''	&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs|GabrielGumbs]]&lt;br /&gt;
* [[User:JeremiahGrossman| JeremiahGrossman]]&lt;br /&gt;
* [[User:Rsnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| MattJohansen]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rsnake&amp;diff=186885</id>
		<title>User:Rsnake</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rsnake&amp;diff=186885"/>
				<updated>2014-12-12T15:57:50Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Created page with &amp;quot;Hello there!  This is RSnake.  Yup, it's me.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello there!  This is RSnake.  Yup, it's me.&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186884</id>
		<title>Application Security Program Quick Start Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Security_Program_Quick_Start_Guide&amp;diff=186884"/>
				<updated>2014-12-12T15:57:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Project lead and authors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= The Application Security Program Quick Start Guide =&lt;br /&gt;
&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preface&lt;br /&gt;
** [[AppSec Quick Start Guide: About this guide|About this guide]]&lt;br /&gt;
** [[AppSec Quick Start Guide: Audience|Audience]]&lt;br /&gt;
&lt;br /&gt;
*Day 1&lt;br /&gt;
[[''''' **Key Activities: ''''']]	&lt;br /&gt;
***Evaluation	&lt;br /&gt;
''''' *Key Questions: ''''' &lt;br /&gt;
*Management&lt;br /&gt;
*Security&lt;br /&gt;
*IT Ops&lt;br /&gt;
*Engineering Groups (inc. QA)/Development	&lt;br /&gt;
''' *Day 2'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Asset Discovery	&lt;br /&gt;
*Asset Risk Prioritization&lt;br /&gt;
*Communication Plan&lt;br /&gt;
''' *Day 3'''&lt;br /&gt;
''''' **Key Activities: ''''' &lt;br /&gt;
*Vulnerability Assessments	&lt;br /&gt;
*Vulnerability delivery	&lt;br /&gt;
''' *Day 4'''	&lt;br /&gt;
''''' **Key Activities: '''''	&lt;br /&gt;
*Measured Metrics	&lt;br /&gt;
''' *Day 5'''	&lt;br /&gt;
''''' **Key activities: '''''	&lt;br /&gt;
*Compensating Controls	&lt;br /&gt;
*Mitigating Controls	&lt;br /&gt;
*Remediation Prioritization	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license].&lt;br /&gt;
You are free to: &lt;br /&gt;
*Share — copy and redistribute the material in any medium or format &lt;br /&gt;
*Adapt — remix, transform, and build upon the material for non-commercial use&lt;br /&gt;
&lt;br /&gt;
The licensor cannot revoke these freedoms as long as you follow the license terms.&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and authors ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Gabrielgumbs|GabrielGumbs]]&lt;br /&gt;
* [[User:JeremiahGrossman| JeremiahGrossman]]&lt;br /&gt;
* [[User:RSnake| '''Robert Hansen''']]&lt;br /&gt;
* [[User:Jerryhoff|'''Jerry Hoff''']]&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User: MattJohansen| MattJohansen]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== Application Security Program Quick Start Guide ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Program Quick Start Guide is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:PlaceHolder.pdf Free downloadable PDF] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Robert_%22RSnake%22_Hansen_(SecTheory)&amp;diff=134863</id>
		<title>Robert &quot;RSnake&quot; Hansen (SecTheory)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Robert_%22RSnake%22_Hansen_(SecTheory)&amp;diff=134863"/>
				<updated>2012-08-27T17:48:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: Updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Robert Hansen (OWASP 2.0 guide contributor, OWASP AppSec US ’08 speaker)'''&lt;br /&gt;
&lt;br /&gt;
Robert &amp;quot;RSnake&amp;quot; Hansen (CISSP) is the Chief Executive Officer of Falling Rock Networks. Falling Rock Networks creates next generation super-secure OS/Webserver stacks. Robert has been working with web application security since the mid 90’s, beginning his career in banner click fraud detection at ValueClick. Robert has worked for Cable &amp;amp; Wireless heading up managed security services, and at eBay as Sr. Global Product Manager of Trust and Safety, focusing on anti-phishing, anti-cross-site scripting, and anti-virus strategies. Robert also sits on the technical advisory board of Lockify. Before Falling Rock Networks and SecTheory, Robert’s career fluctuated from Sr. Security Architect to Director of Product Management for a publicly traded Real Estate company, giving him a great breath of knowledge of the entire security landscape. Robert now focuses on upcoming threats, detection circumvention and next generation security theory. Robert is probably best known for founding the web application security lab at ha.ckers.org and is more popularly known as “RSnake.” Robert is a member of WASC, IACSP, and ISSA, and contributed to the OWASP 2.0 guide.&lt;br /&gt;
&lt;br /&gt;
Robert is formally an OWASP Connections Committee member and a current member of the Blackhat security conference speaker committee, the &amp;quot;Hack in the Box&amp;quot; speaker committee and the World OWASP/LASCON speaker committee.  Robert is a co-author of the authoritative book “XSS Exploits: Cross Site Scripting Attacks and Defense” (Syngress) and of &amp;quot;Detecting Malice&amp;quot; (eBook).&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109985</id>
		<title>Global Conferences Committee - Application 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109985"/>
				<updated>2011-05-04T17:25:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Josh Sokol&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Austin OWASP President, LASCON Co-Chair, Austin OWASP Vice President&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Global Conferences Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | VP&amp;amp;nbsp;of Austin OWASP&amp;amp;nbsp;Chapter&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh is a hard worker and has led the OWASP&amp;amp;nbsp;Austin chapter for 2010 and 2011. &amp;amp;nbsp;Josh has been an instrumental part of the chapter even before that time and has served in many capacities to make OWASP&amp;amp;nbsp;successful in Austin--from communication to members to arranging food for events to speaking at meetings. &amp;amp;nbsp;I&amp;amp;nbsp;highly recommend Josh and I&amp;amp;nbsp;know that he would make a good addition to the committee. &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Brad Causey&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | GPC Member&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | I've enjoyed working with Josh on each of my multiple occasions visiting the Austin, TX Chapter. It seems like everything Josh touches, is done exquisitely. OWASP would be well served by adding Josh to it's list of global leaders.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Robert Hansen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Ex-Connections Committee Member&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh has been working with the Austin OWASP Chapter for the past couple of years and has provided immeasurable assistance to the chapter in drumming up membership, getting top-notch presenters, and generally supporting our activities. He is a stand up person and is amongst the smartest security people I know. I think he would be an excellent fit for the OWASP Global Conferences Committee role and he has my highest recommendation for this position. &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_6&amp;diff=99590</id>
		<title>Global Chapter Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_6&amp;diff=99590"/>
				<updated>2011-01-10T17:16:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Ofer Maor&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Israel Chapter Leader&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Chapters Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Mark Bristow&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Conferences Committee Chair, AppSec DC Organizer, OWASP DC Lead&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ofer has been doing an excellent job in promoting OWASP in the vibrant Israeli government, security, and development community.  His energy and insights would make a great addition to the committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Robert &amp;quot;RSnake&amp;quot; Hansen&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Connections Committee, Board of Austin OWASP&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ofer is one of the most knowledgeable people in OWASP around detection and penetration testing. I see no reason he couldn't help organize the chapters.  I, for one, welcome his expertise.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Membership_Committee_-_Application_3&amp;diff=99589</id>
		<title>Global Membership Committee - Application 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Membership_Committee_-_Application_3&amp;diff=99589"/>
				<updated>2011-01-10T17:15:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Ofer Maor&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Israel Chapter Leader&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Membership Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Mark Bristow&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Conferences Committee Chair, AppSec DC Organizer, OWASP DC Lead&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ofer has been doing an excellent job in promoting OWASP in the vibrant Israeli government, security, and development community.  His energy and insights would make a great addition to the committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Robert &amp;quot;RSnake&amp;quot; Hansen&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Connections Committee, Board of Austin OWASP&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ofer is one of the most knowledgeable people in OWASP around detection and penetration testing.  I see no reason he couldn't help recruit more people into OWASP, leading by example.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee&amp;diff=75503</id>
		<title>OWASP Connections Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee&amp;diff=75503"/>
				<updated>2009-12-26T16:33:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Committee Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===About the OWASP Connections Committee (OCC)===&lt;br /&gt;
The OWASP Connections Committee was created during the OWASP AppSec DC 2009 conference&lt;br /&gt;
&lt;br /&gt;
===Responsibilities===&lt;br /&gt;
* Make connections between the OWASP Community and the materials it creates&lt;br /&gt;
* Handle PR and promotion of OWASP foundation, projects and events&lt;br /&gt;
* Manage OWASP Newsletters&lt;br /&gt;
* Manage OWASP 'collaboration tools': LinkedIn, Twitter feeds, etc...&lt;br /&gt;
** Manage the WIKI account creation authorization process&lt;br /&gt;
* Handle issues related to the OWASP Community and its leaders&lt;br /&gt;
* Expand OWASP range to include other non-'Web Application Security' groups, namely Developers&lt;br /&gt;
* Help OWASP to have further participation at non-OWASP conferences&lt;br /&gt;
* Manager participation at OWASP conferences and chapters of 'special' speakers and groups&lt;br /&gt;
* Work with the OWASP Website project, and help to restructure the current website around its target audience (or maybe help to create a new 'user-focused' OWASP website )&lt;br /&gt;
&lt;br /&gt;
===Committee Members===&lt;br /&gt;
* Lorna Alamri&lt;br /&gt;
* Robert Hansen, (RSnake)&lt;br /&gt;
* Dinis Cruz&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Justin Clarke&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm&amp;diff=23395</id>
		<title>7th OWASP AppSec Conference - San Jose 2007 / OWASP Leaders Meeting - Nov 14 6pm</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm&amp;diff=23395"/>
				<updated>2007-11-13T19:32:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: /* Attendees */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the agenda for the OWASP Leaders meeting that will occur during the next OWASP conference in San Jose (see its [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda|Agenda]] for more details&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Items to discuss ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Internal Structure&lt;br /&gt;
* OWASP 2008 (blueprint)&lt;br /&gt;
* OotM - OWASP on the Move&lt;br /&gt;
* Next SpoC&lt;br /&gt;
* OWASP Books&lt;br /&gt;
* 2008 NYC OWASP CON Update&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attendees ==&lt;br /&gt;
&lt;br /&gt;
* Dinis Cruz&lt;br /&gt;
* Ofer Shezaf&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
* Dave Wichers&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Robert &amp;quot;RSnake&amp;quot; Hansen&lt;br /&gt;
** If your attending, update the wiki so we have a head count for the RSVP&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross_Site_Scripting_Flaw&amp;diff=7088</id>
		<title>Cross Site Scripting Flaw</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross_Site_Scripting_Flaw&amp;diff=7088"/>
				<updated>2006-07-04T00:04:25Z</updated>
		
		<summary type="html">&lt;p&gt;Rsnake: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
Cross-site scripting (sometimes referred to as XSS) vulnerabilities occur when an attacker uses a web application to send malicious code, generally in the form of a script, to a different end user. These flaws are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating it.&lt;br /&gt;
&lt;br /&gt;
An attacker can use cross site scripting to send malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site. These scripts can even rewrite the content of the HTML page.&lt;br /&gt;
&lt;br /&gt;
XSS attacks can generally be categorized into two categories: stored and reflected. Stored attacks are those where the injected code is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Reflected attacks are those where the injected code is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request. Reflected attacks are delivered to victims via another route, such as in an e-mail message, or on some other web server. When a user is tricked into clicking on a malicious link or submitting a specially crafted form, the injected code travels to the vulnerable web server, which reflects the attack back to the user’s browser. The browser then executes the code because it came from a ‘trusted’ server.&lt;br /&gt;
&lt;br /&gt;
The consequence of an XSS attack is the same regardless of whether it is stored or reflected. The difference is in how the payload arrives at the server. Do not be fooled into thinking that a “read only” or “brochureware” site is not vulnerable to serious reflected XSS attacks. XSS can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. The most severe XSS attacks involve disclosure of the user’s session cookie, allowing an attacker to hijack the user’s session and take over the account. Other damaging attacks include the disclosure of end user files, installation of Trojan horse programs, redirecting the user to some other page or site, and modifying presentation of content. An XSS vulnerability allowing an attacker to modify a press release or news item could affect a company’s stock price or lessen consumer confidence. An XSS vulnerability on a pharmaceutical site could allow an attacker to modify dosage information resulting in an overdose.&lt;br /&gt;
&lt;br /&gt;
Attackers frequently use a variety of methods to encode the malicious portion of the tag, such as using Unicode, so the request is less suspicious looking to the user. There are hundreds of variants of these attacks, including versions that do not even require any &amp;lt; &amp;gt; symbols. For this reason, attempting to “filter out” these scripts is not likely to succeed. Instead we recommend validating input against a rigorous positive specification of what is expected. XSS attacks usually come in the form of embedded JavaScript. However, any embedded active content is a potential source of danger, including: ActiveX (OLE), VBscript, Shockwave, Flash and more.&lt;br /&gt;
&lt;br /&gt;
XSS issues can also be present in the underlying web and application servers as well. Most web and application servers generate simple web pages to display in the case of various errors, such as a 404 ‘page not found’ or a 500 ‘internal server error.’ If these pages reflect back any information from the user’s request, such as the URL they were trying to access, they may be vulnerable to a reflected XSS attack.&lt;br /&gt;
&lt;br /&gt;
The likelihood that a site contains XSS vulnerabilities is extremely high. There are a wide variety of ways to trick web applications into relaying malicious scripts. Developers that attempt to filter out the malicious parts of these requests are very likely to overlook possible attacks or encodings. Finding these flaws is not tremendously difficult for attackers, as all they need is a browser and some time. There are numerous free tools available that help hackers find these flaws as well as carefully craft and inject XSS attacks into a target site.&lt;br /&gt;
&lt;br /&gt;
==Environments Affected==&lt;br /&gt;
&lt;br /&gt;
All web servers, application servers, and web application environments are susceptible to cross site scripting. &lt;br /&gt;
&lt;br /&gt;
==Examples and References==&lt;br /&gt;
* The Cross Site Scripting FAQ: http://www.cgisecurity.com/articles/xss-faq.shtml &lt;br /&gt;
* XSS Cheat Sheet: http://ha.ckers.org/xss.html&lt;br /&gt;
* CERT Advisory on Malicious HTML Tags: http://www.cert.org/advisories/CA-2000-02.html &lt;br /&gt;
* CERT “Understanding Malicious Content Mitigation” http://www.cert.org/tech_tips/malicious_code_mitigation.html &lt;br /&gt;
* Cross-Site Scripting Security Exposure Executive Summary: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/topics/ExSumCS.asp &lt;br /&gt;
* Understanding the cause and effect of CSS Vulnerabilities: http://www.technicalinfo.net/papers/CSS.html &lt;br /&gt;
* OWASP Guide to Building Secure Web Applications and Web Services, Chapter 8: Data Validation http://www.owasp.org/documentation/guide.html &lt;br /&gt;
* How to Build an HTTP Request Validation Engine (J2EE validation with Stinger) http://www.owasp.org/columns/jeffwilliams/jeffwilliams2 &lt;br /&gt;
* Have Your Cake and Eat it Too (.NET validation) http://www.owasp.org/columns/jpoteet/jpoteet2 &lt;br /&gt;
&lt;br /&gt;
==How to Determine If You Are Vulnerable==&lt;br /&gt;
XSS flaws can be difficult to identify and remove from a web application. The best way to find flaws is to perform a security review of the code and search for all places where input from an HTTP request could possibly make its way into the HTML output. Note that a variety of different HTML tags can be used to transmit a malicious JavaScript. Nessus, Nikto, and some other available tools can help scan a website for these flaws, but can only scratch the surface. If one part of a website is vulnerable, there is a high likelihood that there are other problems as well.&lt;br /&gt;
&lt;br /&gt;
==How to Protect Yourself==&lt;br /&gt;
&lt;br /&gt;
The best way to protect a web application from XSS attacks is ensure that your application performs validation of all headers, cookies, query strings, form fields, and hidden fields (i.e., all parameters) against a rigorous specification of what should be allowed. The validation should not attempt to identify active content and remove, filter, or sanitize it. There are too many types of active content and too many ways of encoding it to get around filters for such content. We strongly recommend a ‘positive’ security policy that specifies what is allowed. ‘Negative’ or attack signature based policies are difficult to maintain and are likely to be incomplete.&lt;br /&gt;
&lt;br /&gt;
Encoding user supplied output can also defeat XSS vulnerabilities by preventing inserted scripts from being transmitted to users in an executable form. Applications can gain significant protection from javascript based attacks by converting the following characters in all generated output to the appropriate HTML entity encoding:&lt;br /&gt;
&lt;br /&gt;
[[Image:Toptena45.jpg|none|300px]]&lt;br /&gt;
&lt;br /&gt;
The [[:Category:OWASP Filters Project|OWASP Filters project]] is producing reusable components in several languages to help prevent many forms of parameter tampering, including the injection of XSS attacks. OWASP has also released [[OWASP CodeSeeker Project|CodeSeeker]], an application level firewall. In addition, the [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] training program has lessons on Cross Site Scripting and data encoding.&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Top Ten Project]]&lt;br /&gt;
&lt;br /&gt;
__NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Rsnake</name></author>	</entry>

	</feed>