This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP PHP Project Archive (03.2015)

From OWASP
Jump to: navigation, search


OWASP Inactive Banner.jpg

About

The OWASP PHP Project's goal (OWASP PHP Project Roadmap) is to enable developers, systems administrators and application architects to build and deploy secure applications built using the PHP programming language.

Joining the Project

Serg Belokamen is currently steering the project.

Please submit your ideas for individual articles to the OWASP PHP Project Proposals.

If you would like to contribute to the OWASP PHP Project please:

  1. Visit the Tutorial;
  2. Join the mailing list;
  3. Read the OWASP PHP Project Roadmap; and
  4. Pick a topic from the OWASP PHP Project Proposals, OWASP PHP Project Roadmap or suggest a new topic.


Remember to add the tag: [[Category:OWASP PHP Project]] to the end of new articles so that they're properly categorised.

PHP Security Overview

It is not easy to produce a PHP application without security vulnerabilities. Most application security vulnerabilities apply to PHP applications just like other environments.

The goals of this project are to provide information about building, configuring, deploying, operating, and maintaining secure PHP applications. We cover the following topics or pick a topic from the OWASP PHP Table of Contents

PHP Security for Architects
Provides information about the design and architectural considerations for a PHP web application. Common architectures such as MVC, Ajax, Web Services and PEAR / Zend Frameworks are discussed.
PHP Security for Developers
This section covers dangerous calls and common vulnerabilities associated with them, such as system() exec(), eval() and so on. This section will also cover standard security mechanisms available in the standard language, such as cryptography, logging, encryption, and error handling. Securing elements of an application, such as controllers, business logic, and persistence layers will be covered. We'll discuss handling request parameters, encoding, injection, and more.
PHP Security for Deployers
These articles cover topics specifically related to the PHP hosting environment. We discuss minimizing the attack surface, configuring error handlers, and performing hardening of PHP.

PHP Articles