This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects Summit 2014/Working Sessions/006"

From OWASP
Jump to: navigation, search
(Created page with "=OWASP PCI Toolkit== OWASP PCI toolkit is an Open Source c# Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Beta versio...")
 
Line 1: Line 1:
=OWASP PCI Toolkit==
+
=OWASP PCI Toolkit=
  
OWASP PCI toolkit is an Open Source c# Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Beta version of this tool will be released May 2014
+
OWASP PCI toolkit is an Open Source C# Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Beta version of this tool will be released May 2014
 
Introduction
 
Introduction
  
 
The PCI toolkit is based on a decision tree assessment methodology, to help you define if your web applications are part of the PCI-DSS scope and within the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used
 
The PCI toolkit is based on a decision tree assessment methodology, to help you define if your web applications are part of the PCI-DSS scope and within the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used

Revision as of 13:24, 6 May 2014

OWASP PCI Toolkit

OWASP PCI toolkit is an Open Source C# Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Beta version of this tool will be released May 2014 Introduction

The PCI toolkit is based on a decision tree assessment methodology, to help you define if your web applications are part of the PCI-DSS scope and within the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used