This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:OWASP Top 10 Proactive Controls - V2.0.docx

From OWASP
Jump to: navigation, search
OWASP_Top_10_Proactive_Controls_-_V2.0.docx(file size: 870 KB, MIME type: application/vnd.openxmlformats-officedocument.wordprocessingml.document)
Warning: This file type may contain malicious code. By executing it, your system may be compromised.

The OWASP Top Ten Proactive Controls 2016 is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development. Verify for Security Early and Often Parameterize Queries Encode Data Validate All Inputs Implement Identity and Authentication Controls Implement Appropriate Access Controls Protect Data Implement Logging and Intrusion Detection Leverage Security Frameworks and Libraries Error and Exception Handling

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current22:22, 16 March 2016 (870 KB)Jmanico (talk | contribs)The OWASP Top Ten Proactive Controls 2016 is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written...
  • You cannot overwrite this file.

There are no pages that link to this file.