This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Good Component Practices Project"
From OWASP
Mark Miller (talk | contribs) m |
Mark Miller (talk | contribs) m |
||
Line 8: | Line 8: | ||
<ol> | <ol> | ||
− | <li> | + | <li>Selection of the component and where it come from (provenance)</li> |
<li>Integration of the component into the development environment</li> | <li>Integration of the component into the development environment</li> | ||
<li>Integration of the component into the production environment</li> | <li>Integration of the component into the production environment</li> |
Revision as of 22:05, 24 April 2013
Main
This project will document a set of best practices for managing component vulnerability at three main gateways.
Gateways of Component Vulnerability
When establishing a framework for Good Component Practices, there are three gateways at which a vulnerability may occur:
- Selection of the component and where it come from (provenance)
- Integration of the component into the development environment
- Integration of the component into the production environment
We will look at each level of vulnerability and establish a series of best practices for managing the component usage at that level
Mark Miller 22:04, 24 April 2013 (UTC)
Project About
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|