<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Application_Security_Assessment_Standards_Project%2FRoadmap</id>
		<title>OWASP Application Security Assessment Standards Project/Roadmap - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Application_Security_Assessment_Standards_Project%2FRoadmap"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project/Roadmap&amp;action=history"/>
		<updated>2026-04-23T23:01:10Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project/Roadmap&amp;diff=107268&amp;oldid=prev</id>
		<title>Paulo Coimbra: Created page with &quot;*Define the Application Security Assessment procedure into a Vulnerability Management procedure. Every step of the Application Security Assessment process should make some output...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Assessment_Standards_Project/Roadmap&amp;diff=107268&amp;oldid=prev"/>
				<updated>2011-03-21T18:44:16Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;*Define the Application Security Assessment procedure into a Vulnerability Management procedure. Every step of the Application Security Assessment process should make some output...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;*Define the Application Security Assessment procedure into a Vulnerability Management procedure. Every step of the Application Security Assessment process should make some outputs related to Vulnerabilities/Risk related to the application.&lt;br /&gt;
*Define how to prioritize WebApp Vulnerabilities working with CWE mapping and scoring systems as CWSS (referring to OWASP TOP 10)&lt;br /&gt;
*Define a process of App Security Assessment that is Threat/Vulnerability Centric and that contains at least the following milestones:&lt;br /&gt;
**Use OWASP ASVS in order to define the AS-IS of the application validation process using the following techniques:&lt;br /&gt;
***Maturity Model (referring to OWASP SAMM Project)&lt;br /&gt;
***Attack Surface of the Application (referring to OWASP Code Review Project)&lt;br /&gt;
***Threat Modeling of the Application (referring to OWASP Code Review Project)&lt;br /&gt;
***WAPT/Code Review/VA (referring to OWASP Testing/Code Review Projects)&lt;br /&gt;
**Use OWASP ASVS in order to define the TO-BE of the application validation process.&lt;br /&gt;
**For each level definable as TO-BE of the application validation process define how to implement&lt;br /&gt;
***Processes:&lt;br /&gt;
****SSDLC (Referring to OWASP Development Guide)&lt;br /&gt;
****Code Review (referring to OWASP Code Review Project and OWASP SAMM)&lt;br /&gt;
****WAPT (referring to OWASP Testing Guide and OWASP SAMM)&lt;br /&gt;
***Technical Projects:&lt;br /&gt;
****OWASP ESAPI&lt;br /&gt;
****OWASP AppSensor&lt;br /&gt;
**Practical Examples&lt;br /&gt;
***Demo on how to implement ESAPI/AppSensor in a production project&lt;br /&gt;
***Tips on how to implement an Application Security Assessment Process into a production environment&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt;&amp;gt;&amp;gt;&amp;gt;[http://www.owasp.org/images/4/42/AppSecurityAssessProcess.pdf A diagram which describes at high level the idea of the Application Security Process from initial assessment to final mitigation and review].&lt;/div&gt;</summary>
		<author><name>Paulo Coimbra</name></author>	</entry>

	</feed>