This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityInPlanning"
From OWASP
Matt Konda (talk | contribs) |
Matt Konda (talk | contribs) |
||
| Line 23: | Line 23: | ||
|- | |- | ||
|Monitoring and Controlling | |Monitoring and Controlling | ||
| − | |||
| | | | ||
| | | | ||
| Line 34: | Line 33: | ||
| | | | ||
| | | | ||
| − | |||
|} | |} | ||
[[Category:Name]] | [[Category:Name]] | ||
Revision as of 17:53, 12 October 2016
This page is a working area for mapping PMP project paths to security checklists.
| Initiation | Planning | Execution | Monitoring and Controlling | Close |
| Authentication | ||||
| Monitoring and Controlling | ||||
| Close |