<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zqc0512</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zqc0512"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Zqc0512"/>
		<updated>2026-04-21T05:18:10Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Vulnerability&amp;diff=50104</id>
		<title>Category:Vulnerability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Vulnerability&amp;diff=50104"/>
				<updated>2009-01-05T08:23:29Z</updated>
		
		<summary type="html">&lt;p&gt;Zqc0512: /* What is a vulnerability? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This category is for tagging common types of software vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==What is a vulnerability?==     test test test test test &lt;br /&gt;
&lt;br /&gt;
&amp;lt;categorytree hideroot=&amp;quot;on&amp;quot; style=&amp;quot;float:right; clear:right; margin-left:1ex; border:1px solid gray; padding:0.7ex; background-color:white;&amp;quot;&amp;gt;Vulnerability&amp;lt;/categorytree&amp;gt;&lt;br /&gt;
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application. Stakeholders include the application owner, application users, and other entities that rely on the application.  The term &amp;quot;vulnerability&amp;quot; is often used very loosely. However, here we need to distinguish [[:Category:Threat|threats]], [[:Category:Attack|attacks]], and [[:Category:Countermeasure|countermeasures]].&lt;br /&gt;
&lt;br /&gt;
Please '''do not post any actual vulnerabilities''' in products, services, or web applications. Those disclosure reports should be posted to bugtraq or full-disclosure mailing lists.&lt;br /&gt;
&lt;br /&gt;
==Examples of vulnerabilities==&lt;br /&gt;
* Lack of input validation on user input&lt;br /&gt;
* Lack of sufficient logging mechanism&lt;br /&gt;
* Fail-open error handling&lt;br /&gt;
* Not closing the database connection properly&lt;br /&gt;
&lt;br /&gt;
For a great overview, check out the [[OWASP Top Ten Project]]. You can read about the top vulnerabilities and download a paper that covers them in detail. Many organizations and agencies use the Top Ten as a way of creating awareness about application security.&lt;br /&gt;
&lt;br /&gt;
{{Template:PutInCategory}}&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' Before you add a vulnerability, please search and make sure there isn't an equivalent one already. You may want to consider creating a redirect if the topic is the same. Every vulnerability article has a defined structure. Please read the details of [[How To Add a Vulnerability]] before creating a new article.&lt;br /&gt;
&lt;br /&gt;
[[Category:Article Type]]&lt;br /&gt;
[[Category:OWASP Honeycomb Project]]&lt;/div&gt;</summary>
		<author><name>Zqc0512</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CLASP_Concepts&amp;diff=48320</id>
		<title>CLASP Concepts</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CLASP_Concepts&amp;diff=48320"/>
				<updated>2008-12-11T03:30:55Z</updated>
		
		<summary type="html">&lt;p&gt;Zqc0512: /* Overview of CLASP Taxonomy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==Concepts View==&lt;br /&gt;
[[Glossary#CLASP|CLASP]] is the outgrowth of years of extensive field work in which system resources of many development lifecycles were methodically decomposed in order to create a comprehensive set of security requirements. These resulting requirements form the basis of CLASP’s best practices which allow organizations to systematically address vulnerabilities that, if exploited, can result in the failure of basic security services — e.g., confidentiality, authentication, and access control.&lt;br /&gt;
&lt;br /&gt;
===Adaptability of CLASP to Existing Development Processes===&lt;br /&gt;
[[Glossary#CLASP|CLASP]] is designed to allow you to easily integrate its security-related activities into your existing application development processes. Each [[Glossary#CLASP|CLASP]] activity is divided into discrete process components and linked to one or more specific project roles. In this way, [[Glossary#CLASP|CLASP]] provides guidance to project participants — e.g., project managers, security auditors, developers, architects, testers, and others — that is easy to adopt to their way of working; this results in incremental improvements to security that are easily achievable, repeatable, and measurable. &lt;br /&gt;
&lt;br /&gt;
===CLASP Vulnerability Lexicon===&lt;br /&gt;
[[Glossary#CLASP|CLASP]] also contains a comprehensive Vulnerability Lexicon that helps development teams avoid/remediate specific designing/coding errors that can lead to exploitable security services. The basis of this Lexicon is a highly flexible taxonomy — i.e., classification structure — that enables development teams to quickly locate Lexicon information from many perspectives: e.g., problem types (i.e., basic causes of vulnerabilities); categories of problem types; exposure periods; avoidance and mitigation periods; consequences of exploited vulnerabilities; affected platforms and programming languages; risk assessment.&lt;br /&gt;
&lt;br /&gt;
===Automated Analysis Tool===&lt;br /&gt;
Much of the information in the [[Glossary#CLASP|CLASP]] Vulnerability Lexicon can be enforced through use of automated tools using techniques of static analysis of source code.&lt;br /&gt;
&lt;br /&gt;
==Overview of CLASP Process==&lt;br /&gt;
This section provides an overview of [[Glossary#CLASP|CLASP]]’s structure and of the dependencies between the [[Glossary#CLASP|CLASP]] process components and is organized as follows:&lt;br /&gt;
* CLASP Views&lt;br /&gt;
* CLASP Resources&lt;br /&gt;
* Vulnerability Use Cases&lt;br /&gt;
&lt;br /&gt;
===CLASP Views===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] process is presented through five high-level perspectives called [[Glossary#CLASP|CLASP]] Views. These views are broken down into activities which in turn contain process components. This top-down organization by View &amp;gt; Activity &amp;gt; Process Component allows you to quickly understand the [[Glossary#CLASP|CLASP]] process, how [[Glossary#CLASP|CLASP]] pieces interact, and how to apply them to your specific software development lifecycle.&lt;br /&gt;
These are the [[Glossary#CLASP|CLASP]] Views: &lt;br /&gt;
* Concepts View&lt;br /&gt;
* Role-Based View&lt;br /&gt;
* Activity-Assessment View&lt;br /&gt;
* Activity-Implementation View&lt;br /&gt;
* Vulnerability View&lt;br /&gt;
See figure 1.&lt;br /&gt;
&lt;br /&gt;
[[Image:CLASP_Views.gif|none|thumb|600px|Figure 1: CLASP Views and their interactions]]&lt;br /&gt;
&lt;br /&gt;
===CLASP Resources===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] process supports planning, implementing and performing security-related software development activities. The [[Glossary#CLASP|CLASP]] Resources provide access to artifacts that are especially useful if your project is using tools to help automate [[Glossary#CLASP|CLASP]] process pieces.&lt;br /&gt;
This table lists the name and location of [[Glossary#CLASP|CLASP]] Resources delivered with [[Glossary#CLASP|CLASP]] and indicates which [[Glossary#CLASP|CLASP]] Views they can support:  &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
|-----&lt;br /&gt;
!CLASP Resources&lt;br /&gt;
!Location&lt;br /&gt;
|-----&lt;br /&gt;
| Basic Principles in Application Security (all Views) || Resource A&lt;br /&gt;
|-----&lt;br /&gt;
| Example of Basic Principle: Input Validation (all Views) || Resource B&lt;br /&gt;
|-----&lt;br /&gt;
| Example of Basic-Principle Violation: Penetrate-and-Patch Model (all Views) || Resource C&lt;br /&gt;
|-----&lt;br /&gt;
| Core Security Services (all Views; especially III) || Resource D&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Coding Guideline Worksheets (Views II, III &amp;amp; IV)&lt;br /&gt;
Note: Each worksheet can be pasted into a MS Word document.&lt;br /&gt;
| Resource E&lt;br /&gt;
|-----&lt;br /&gt;
| System Assessment Worksheets (Views III &amp;amp; IV)&lt;br /&gt;
Note: Each worksheet can be pasted into a MS Word document.&lt;br /&gt;
| Resource F&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Road Map: Legacy Projects (View III) || Resource G1&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Road Map: New-Start Projects (View III)|| Resource G2&lt;br /&gt;
|-----&lt;br /&gt;
| Creating the Process Engineering Plan (View III)|| Resource H&lt;br /&gt;
|-----&lt;br /&gt;
| Forming the Process Engineering Team (View III) || Resource I&lt;br /&gt;
|-----&lt;br /&gt;
| Glossary of Security Terms (all Views) || [[Glossary|Resource J]]&lt;br /&gt;
|-----&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Vulnerability Use Cases===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] Vulnerability Use Cases depict conditions under which security services can become vulnerable in software applications. The Use Cases provide [[Glossary#CLASP|CLASP]] users with easy-to-understand, specific examples of the cause-and-effect relationship between security-unaware design/source coding and possible resulting vulnerabilities in basic security services — e.g., authentication authorization, confidentiality, availability, accountability, and non-repudiation. &lt;br /&gt;
The [[Glossary#CLASP|CLASP]] Vulnerability Use Cases are based on the following common component architectures:&lt;br /&gt;
* Monolithic UNIX&lt;br /&gt;
* Monolithic mainframe&lt;br /&gt;
* Distributed architecture (HTTP[S] &amp;amp; TCP/IP)&lt;br /&gt;
It is recommended to understand the [[Glossary#CLASP|CLASP]] Use Cases as a bridge from the Concepts View of [[Glossary#CLASP|CLASP]] to the Vulnerability Lexicon (in the Vulnerability View) since they provide specific examples of security services becoming vulnerable in software applications&lt;br /&gt;
See figure 2.&lt;br /&gt;
[[Image:CLASP_Vulnerability_Use_Cases.gif|none|thumb|600px|Figure 2: Recommended position of the Use Cases within the CLASP process]]&lt;br /&gt;
&lt;br /&gt;
===CLASP Best Practices===&lt;br /&gt;
The foundation of CLASP is in seven key Best Practices for application security. See [[:Category:CLASP Best Practice|CLASP Best Practices]].&lt;br /&gt;
# [[:Category:BP1 Institute awareness programs|Institute awareness programs]]&lt;br /&gt;
# [[:Category:BP2 Perform application assessments|Perform application assessments]]&lt;br /&gt;
# [[:Category:BP3 Capture security requirements|Capture security requirements]]&lt;br /&gt;
# [[:Category:BP4 Implement secure development practices|Implement secure development practices]]&lt;br /&gt;
# [[:Category:BP5 Build vulnerability remediation procedures|Build vulnerability remediation procedures]]&lt;br /&gt;
# [[:Category:BP6 Define and monitor metrics|Define and monitor metrics]]&lt;br /&gt;
# [[:Category:BP7 Publish operational security guidelines|Publish operational security guidelines]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CLASP and Security Policies==&lt;br /&gt;
A high-level view of [[Glossary#CLASP|CLASP]] can help increase awareness of the importance of implementing application security on these organizational levels, from the bottom up: &amp;gt; best practices of application-security &amp;gt; application-security policy &amp;gt; IT security policy &amp;gt; operations security policy &amp;gt; corporate security policy.&lt;br /&gt;
[[Image:CLASP_and_Security_Policies.gif|none|thumb|600px|Figure 4: Interaction of CLASP and Security Policies]]&lt;br /&gt;
&lt;br /&gt;
==What is a Security Vulnerability==&lt;br /&gt;
[[Glossary#CLASP|CLASP]] defines a security vulnerability as a flaw in a software environment — especially in an application — that allows an attacker to assume privileges within the user's system, utilize and regulate its operation, compromise the data it contains, and/or assume trust not granted to the attacker.&lt;br /&gt;
A security vulnerability occurs in a software application when any part of it allows a breach of the security policy governing it.&lt;br /&gt;
[[Glossary#CLASP|CLASP]] identifies 104 underlying problem types that form the basis of security vulnerabilities in application source code. An individual problem type in itself is often not a security vulnerability; frequently it is a combination of problems that create a security condition leading to a vulnerability in the source code. [[Glossary#CLASP|CLASP]] divides the 104 problem types into 5 high-level categories. Each problem type may have more than one parent category. &lt;br /&gt;
[[Glossary#CLASP|CLASP]] defines a consequence of an exploited or exploitable vulnerability as a failure in one or more of these basic security services: &lt;br /&gt;
* Authorization (resource access control)&lt;br /&gt;
* Confidentiality (of data or other resources)&lt;br /&gt;
* Authentication (identity establishment and integrity)&lt;br /&gt;
* Availability (denial of service)&lt;br /&gt;
* Accountability&lt;br /&gt;
* Non-repudiation&lt;br /&gt;
The following figure shows in which phases of the software development lifecycle a security-related vulnerability can occur and also which points in an operational system an attack can target.&lt;br /&gt;
[[Image:CLASP_Vulnerabilities_SDLC_Phases.gif|none|thumb|600px|Figure 5: Vulnerabilities from Perspective of SDLC Phases]]&lt;br /&gt;
&lt;br /&gt;
==Overview of CLASP Taxonomy==&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] taxonomy is a high-level classification of the [[Glossary#CLASP|CLASP]] process, divided into the following classes for better evaluation and resolution of security vulnerabilities in source code: &lt;br /&gt;
* '''Problem types''' underlying security-related vulnerabilities.&lt;br /&gt;
* '''Categories''' into which the problem types are divided for diagnostic and resolution purposes.&lt;br /&gt;
* '''Exposure periods''' (i.e., SDLC phases) in which vulnerabilities can be inadvertently introduced into application source code.&lt;br /&gt;
* '''Consequences''' of exploited vulnerabilities for basic security services.&lt;br /&gt;
* '''Platforms''' and programming languages which may be affected by a vulnerability.&lt;br /&gt;
* '''Resources''' required for attack against vulnerabilities.&lt;br /&gt;
* '''Risk assessment''' of exploitable/exploited vulnerabilities.&lt;br /&gt;
* '''Avoidance and mitigation periods''' (i.e., SDLC phases) in which preventative measures and countermeasures can be applied.  &lt;br /&gt;
See figure 6.&lt;br /&gt;
[[Image:CLASP_Taxonomy.gif|none|thumb|600px|Figure 6: CLASP taxonomy and the relationship between its parts]]&lt;br /&gt;
&lt;br /&gt;
==Applying CLASP Components==&lt;br /&gt;
This page describes a possible sequence for applying [[Glossary#CLASP|CLASP]] components, using the Sample Coding Guidelines ([[Glossary#CLASP|CLASP]] Resource E) as a basis. See figure 7.&lt;br /&gt;
[[Image:CLASP_Applying_Components.gif|none|thumb|600px|Figure 7: a possible sequence for applying CLASP components]]&lt;br /&gt;
The steps below describe a possible sequence for applying [[Glossary#CLASP|CLASP]] components depicted in the figure above:&lt;br /&gt;
* Read the [[Glossary#CLASP|CLASP]] Concepts View to gain an overview of the [[Glossary#CLASP|CLASP]] process.&lt;br /&gt;
* In the Concepts View, pay special attention to the page Description of [[Glossary#CLASP|CLASP]] Process. This page contains a diagram showing, among other things, the location of the 104 [[Glossary#CLASP|CLASP]] problem types (i.e., basic causes of vulnerabilities), the five high-level, source-code-related categories by which they are organized, and the consequences of exploitable security vulnerabilities for security services.&lt;br /&gt;
* Read the [[Glossary#CLASP|CLASP]] Sample Coding Guidelines thoroughly and select a subset of them relevant to your specific software development project. These guidelines contain a set of security-related coding standards to be applied to your project.&lt;br /&gt;
* Apply the remaining [[Glossary#CLASP|CLASP]] Resources throughout the planning, design, construction, and testing process, as needed.&lt;br /&gt;
* Use the Sample Coding Guidelines to select a subset of the 104 [[Glossary#CLASP|CLASP]] problem types (i.e., basic causes of vulnerabilities) — located in the [[Glossary#CLASP|CLASP]] Vulnerability View — which are most important to your project.&lt;br /&gt;
* Familiarize yourself with the [[Glossary#CLASP|CLASP]] Role-Based View, which provides an overview of the project roles associated with applying the selected subset of Sample Coding Guidelines, and assign these guidelines to your relevant project personnel — e.g., designer, security auditor, implementers.&lt;br /&gt;
* Consider the subset of vulnerabilities selected in part though the Sample Coding Guidelines when using the Activity-Assessment View to assess and select the desired subset of 24 activities contained in the Activity-Implementation View.&lt;br /&gt;
&lt;br /&gt;
== CLASP and IT Internal Controls ==&lt;br /&gt;
A significant number of the internal controls required by the Sarbanes-Oxley Act for assurance of accurate and reliable corporate financial reporting are located in the IT area. &lt;br /&gt;
The figure below shows how [[Glossary#CLASP|CLASP]] can help secure the IT internal controls that are necessary to assure the integrity of data in financial applications within the scope of security-related software development projects.&lt;br /&gt;
[[Image:CLASP_IT_Internal_Controls.gif|none|thumb|600px|Figure 8: How CLASP can help secure the IT internal controls that are necessary to assure the integrity of data in financial applications within the scope of security-related software development projects. Centers on Sarbanes-Oxley sections 302, 404 and 409]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CLASP Project]]&lt;/div&gt;</summary>
		<author><name>Zqc0512</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CLASP_Concepts&amp;diff=48319</id>
		<title>CLASP Concepts</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CLASP_Concepts&amp;diff=48319"/>
				<updated>2008-12-11T03:28:58Z</updated>
		
		<summary type="html">&lt;p&gt;Zqc0512: /* Overview of CLASP Taxonomy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==Concepts View==&lt;br /&gt;
[[Glossary#CLASP|CLASP]] is the outgrowth of years of extensive field work in which system resources of many development lifecycles were methodically decomposed in order to create a comprehensive set of security requirements. These resulting requirements form the basis of CLASP’s best practices which allow organizations to systematically address vulnerabilities that, if exploited, can result in the failure of basic security services — e.g., confidentiality, authentication, and access control.&lt;br /&gt;
&lt;br /&gt;
===Adaptability of CLASP to Existing Development Processes===&lt;br /&gt;
[[Glossary#CLASP|CLASP]] is designed to allow you to easily integrate its security-related activities into your existing application development processes. Each [[Glossary#CLASP|CLASP]] activity is divided into discrete process components and linked to one or more specific project roles. In this way, [[Glossary#CLASP|CLASP]] provides guidance to project participants — e.g., project managers, security auditors, developers, architects, testers, and others — that is easy to adopt to their way of working; this results in incremental improvements to security that are easily achievable, repeatable, and measurable. &lt;br /&gt;
&lt;br /&gt;
===CLASP Vulnerability Lexicon===&lt;br /&gt;
[[Glossary#CLASP|CLASP]] also contains a comprehensive Vulnerability Lexicon that helps development teams avoid/remediate specific designing/coding errors that can lead to exploitable security services. The basis of this Lexicon is a highly flexible taxonomy — i.e., classification structure — that enables development teams to quickly locate Lexicon information from many perspectives: e.g., problem types (i.e., basic causes of vulnerabilities); categories of problem types; exposure periods; avoidance and mitigation periods; consequences of exploited vulnerabilities; affected platforms and programming languages; risk assessment.&lt;br /&gt;
&lt;br /&gt;
===Automated Analysis Tool===&lt;br /&gt;
Much of the information in the [[Glossary#CLASP|CLASP]] Vulnerability Lexicon can be enforced through use of automated tools using techniques of static analysis of source code.&lt;br /&gt;
&lt;br /&gt;
==Overview of CLASP Process==&lt;br /&gt;
This section provides an overview of [[Glossary#CLASP|CLASP]]’s structure and of the dependencies between the [[Glossary#CLASP|CLASP]] process components and is organized as follows:&lt;br /&gt;
* CLASP Views&lt;br /&gt;
* CLASP Resources&lt;br /&gt;
* Vulnerability Use Cases&lt;br /&gt;
&lt;br /&gt;
===CLASP Views===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] process is presented through five high-level perspectives called [[Glossary#CLASP|CLASP]] Views. These views are broken down into activities which in turn contain process components. This top-down organization by View &amp;gt; Activity &amp;gt; Process Component allows you to quickly understand the [[Glossary#CLASP|CLASP]] process, how [[Glossary#CLASP|CLASP]] pieces interact, and how to apply them to your specific software development lifecycle.&lt;br /&gt;
These are the [[Glossary#CLASP|CLASP]] Views: &lt;br /&gt;
* Concepts View&lt;br /&gt;
* Role-Based View&lt;br /&gt;
* Activity-Assessment View&lt;br /&gt;
* Activity-Implementation View&lt;br /&gt;
* Vulnerability View&lt;br /&gt;
See figure 1.&lt;br /&gt;
&lt;br /&gt;
[[Image:CLASP_Views.gif|none|thumb|600px|Figure 1: CLASP Views and their interactions]]&lt;br /&gt;
&lt;br /&gt;
===CLASP Resources===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] process supports planning, implementing and performing security-related software development activities. The [[Glossary#CLASP|CLASP]] Resources provide access to artifacts that are especially useful if your project is using tools to help automate [[Glossary#CLASP|CLASP]] process pieces.&lt;br /&gt;
This table lists the name and location of [[Glossary#CLASP|CLASP]] Resources delivered with [[Glossary#CLASP|CLASP]] and indicates which [[Glossary#CLASP|CLASP]] Views they can support:  &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
|-----&lt;br /&gt;
!CLASP Resources&lt;br /&gt;
!Location&lt;br /&gt;
|-----&lt;br /&gt;
| Basic Principles in Application Security (all Views) || Resource A&lt;br /&gt;
|-----&lt;br /&gt;
| Example of Basic Principle: Input Validation (all Views) || Resource B&lt;br /&gt;
|-----&lt;br /&gt;
| Example of Basic-Principle Violation: Penetrate-and-Patch Model (all Views) || Resource C&lt;br /&gt;
|-----&lt;br /&gt;
| Core Security Services (all Views; especially III) || Resource D&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Coding Guideline Worksheets (Views II, III &amp;amp; IV)&lt;br /&gt;
Note: Each worksheet can be pasted into a MS Word document.&lt;br /&gt;
| Resource E&lt;br /&gt;
|-----&lt;br /&gt;
| System Assessment Worksheets (Views III &amp;amp; IV)&lt;br /&gt;
Note: Each worksheet can be pasted into a MS Word document.&lt;br /&gt;
| Resource F&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Road Map: Legacy Projects (View III) || Resource G1&lt;br /&gt;
|-----&lt;br /&gt;
| Sample Road Map: New-Start Projects (View III)|| Resource G2&lt;br /&gt;
|-----&lt;br /&gt;
| Creating the Process Engineering Plan (View III)|| Resource H&lt;br /&gt;
|-----&lt;br /&gt;
| Forming the Process Engineering Team (View III) || Resource I&lt;br /&gt;
|-----&lt;br /&gt;
| Glossary of Security Terms (all Views) || [[Glossary|Resource J]]&lt;br /&gt;
|-----&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Vulnerability Use Cases===&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] Vulnerability Use Cases depict conditions under which security services can become vulnerable in software applications. The Use Cases provide [[Glossary#CLASP|CLASP]] users with easy-to-understand, specific examples of the cause-and-effect relationship between security-unaware design/source coding and possible resulting vulnerabilities in basic security services — e.g., authentication authorization, confidentiality, availability, accountability, and non-repudiation. &lt;br /&gt;
The [[Glossary#CLASP|CLASP]] Vulnerability Use Cases are based on the following common component architectures:&lt;br /&gt;
* Monolithic UNIX&lt;br /&gt;
* Monolithic mainframe&lt;br /&gt;
* Distributed architecture (HTTP[S] &amp;amp; TCP/IP)&lt;br /&gt;
It is recommended to understand the [[Glossary#CLASP|CLASP]] Use Cases as a bridge from the Concepts View of [[Glossary#CLASP|CLASP]] to the Vulnerability Lexicon (in the Vulnerability View) since they provide specific examples of security services becoming vulnerable in software applications&lt;br /&gt;
See figure 2.&lt;br /&gt;
[[Image:CLASP_Vulnerability_Use_Cases.gif|none|thumb|600px|Figure 2: Recommended position of the Use Cases within the CLASP process]]&lt;br /&gt;
&lt;br /&gt;
===CLASP Best Practices===&lt;br /&gt;
The foundation of CLASP is in seven key Best Practices for application security. See [[:Category:CLASP Best Practice|CLASP Best Practices]].&lt;br /&gt;
# [[:Category:BP1 Institute awareness programs|Institute awareness programs]]&lt;br /&gt;
# [[:Category:BP2 Perform application assessments|Perform application assessments]]&lt;br /&gt;
# [[:Category:BP3 Capture security requirements|Capture security requirements]]&lt;br /&gt;
# [[:Category:BP4 Implement secure development practices|Implement secure development practices]]&lt;br /&gt;
# [[:Category:BP5 Build vulnerability remediation procedures|Build vulnerability remediation procedures]]&lt;br /&gt;
# [[:Category:BP6 Define and monitor metrics|Define and monitor metrics]]&lt;br /&gt;
# [[:Category:BP7 Publish operational security guidelines|Publish operational security guidelines]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CLASP and Security Policies==&lt;br /&gt;
A high-level view of [[Glossary#CLASP|CLASP]] can help increase awareness of the importance of implementing application security on these organizational levels, from the bottom up: &amp;gt; best practices of application-security &amp;gt; application-security policy &amp;gt; IT security policy &amp;gt; operations security policy &amp;gt; corporate security policy.&lt;br /&gt;
[[Image:CLASP_and_Security_Policies.gif|none|thumb|600px|Figure 4: Interaction of CLASP and Security Policies]]&lt;br /&gt;
&lt;br /&gt;
==What is a Security Vulnerability==&lt;br /&gt;
[[Glossary#CLASP|CLASP]] defines a security vulnerability as a flaw in a software environment — especially in an application — that allows an attacker to assume privileges within the user's system, utilize and regulate its operation, compromise the data it contains, and/or assume trust not granted to the attacker.&lt;br /&gt;
A security vulnerability occurs in a software application when any part of it allows a breach of the security policy governing it.&lt;br /&gt;
[[Glossary#CLASP|CLASP]] identifies 104 underlying problem types that form the basis of security vulnerabilities in application source code. An individual problem type in itself is often not a security vulnerability; frequently it is a combination of problems that create a security condition leading to a vulnerability in the source code. [[Glossary#CLASP|CLASP]] divides the 104 problem types into 5 high-level categories. Each problem type may have more than one parent category. &lt;br /&gt;
[[Glossary#CLASP|CLASP]] defines a consequence of an exploited or exploitable vulnerability as a failure in one or more of these basic security services: &lt;br /&gt;
* Authorization (resource access control)&lt;br /&gt;
* Confidentiality (of data or other resources)&lt;br /&gt;
* Authentication (identity establishment and integrity)&lt;br /&gt;
* Availability (denial of service)&lt;br /&gt;
* Accountability&lt;br /&gt;
* Non-repudiation&lt;br /&gt;
The following figure shows in which phases of the software development lifecycle a security-related vulnerability can occur and also which points in an operational system an attack can target.&lt;br /&gt;
[[Image:CLASP_Vulnerabilities_SDLC_Phases.gif|none|thumb|600px|Figure 5: Vulnerabilities from Perspective of SDLC Phases]]&lt;br /&gt;
&lt;br /&gt;
==Overview of CLASP Taxonomy==&lt;br /&gt;
The [[Glossary#CLASP|CLASP]] taxonomy is a high-level classification of the [[Glossary#CLASP|CLASP]] process, divided into the following classes for better evaluation and resolution of security vulnerabilities in source code: &lt;br /&gt;
* '''Problem types''' underlying security-related vulnerabilities.&lt;br /&gt;
* '''Categories''' into which the problem types are divided for diagnostic and resolution purposes.&lt;br /&gt;
* '''Exposure periods''' (i.e., SDLC phases) in which vulnerabilities can be inadvertently introduced into application source code.&lt;br /&gt;
* '''Consequences''' of exploited vulnerabilities for basic security services.&lt;br /&gt;
* '''Platforms''' and programming languages which may be affected by a vulnerability.&lt;br /&gt;
* '''Resources''' required for attack against vulnerabilities.&lt;br /&gt;
* '''Risk assessment''' of exploitable/exploited vulnerabilities.&lt;br /&gt;
* '''Avoidance and mitigation periods''' (i.e., SDLC phases) in which preventative measures and countermeasures can be applied.   yes test&lt;br /&gt;
See figure 6.&lt;br /&gt;
[[Image:CLASP_Taxonomy.gif|none|thumb|600px|Figure 6: CLASP taxonomy and the relationship between its parts]]&lt;br /&gt;
&lt;br /&gt;
==Applying CLASP Components==&lt;br /&gt;
This page describes a possible sequence for applying [[Glossary#CLASP|CLASP]] components, using the Sample Coding Guidelines ([[Glossary#CLASP|CLASP]] Resource E) as a basis. See figure 7.&lt;br /&gt;
[[Image:CLASP_Applying_Components.gif|none|thumb|600px|Figure 7: a possible sequence for applying CLASP components]]&lt;br /&gt;
The steps below describe a possible sequence for applying [[Glossary#CLASP|CLASP]] components depicted in the figure above:&lt;br /&gt;
* Read the [[Glossary#CLASP|CLASP]] Concepts View to gain an overview of the [[Glossary#CLASP|CLASP]] process.&lt;br /&gt;
* In the Concepts View, pay special attention to the page Description of [[Glossary#CLASP|CLASP]] Process. This page contains a diagram showing, among other things, the location of the 104 [[Glossary#CLASP|CLASP]] problem types (i.e., basic causes of vulnerabilities), the five high-level, source-code-related categories by which they are organized, and the consequences of exploitable security vulnerabilities for security services.&lt;br /&gt;
* Read the [[Glossary#CLASP|CLASP]] Sample Coding Guidelines thoroughly and select a subset of them relevant to your specific software development project. These guidelines contain a set of security-related coding standards to be applied to your project.&lt;br /&gt;
* Apply the remaining [[Glossary#CLASP|CLASP]] Resources throughout the planning, design, construction, and testing process, as needed.&lt;br /&gt;
* Use the Sample Coding Guidelines to select a subset of the 104 [[Glossary#CLASP|CLASP]] problem types (i.e., basic causes of vulnerabilities) — located in the [[Glossary#CLASP|CLASP]] Vulnerability View — which are most important to your project.&lt;br /&gt;
* Familiarize yourself with the [[Glossary#CLASP|CLASP]] Role-Based View, which provides an overview of the project roles associated with applying the selected subset of Sample Coding Guidelines, and assign these guidelines to your relevant project personnel — e.g., designer, security auditor, implementers.&lt;br /&gt;
* Consider the subset of vulnerabilities selected in part though the Sample Coding Guidelines when using the Activity-Assessment View to assess and select the desired subset of 24 activities contained in the Activity-Implementation View.&lt;br /&gt;
&lt;br /&gt;
== CLASP and IT Internal Controls ==&lt;br /&gt;
A significant number of the internal controls required by the Sarbanes-Oxley Act for assurance of accurate and reliable corporate financial reporting are located in the IT area. &lt;br /&gt;
The figure below shows how [[Glossary#CLASP|CLASP]] can help secure the IT internal controls that are necessary to assure the integrity of data in financial applications within the scope of security-related software development projects.&lt;br /&gt;
[[Image:CLASP_IT_Internal_Controls.gif|none|thumb|600px|Figure 8: How CLASP can help secure the IT internal controls that are necessary to assure the integrity of data in financial applications within the scope of security-related software development projects. Centers on Sarbanes-Oxley sections 302, 404 and 409]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CLASP Project]]&lt;/div&gt;</summary>
		<author><name>Zqc0512</name></author>	</entry>

	</feed>