This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Application Security Guide For CISOs Project v2"
Marco-cincy (talk | contribs) |
Marco-cincy (talk | contribs) |
||
(41 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
− | | valign="top" | + | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | |
==OWASP Application Security Guide For CISOs (Version 2 - 2018 Edition)== | ==OWASP Application Security Guide For CISOs (Version 2 - 2018 Edition)== | ||
Among application security stakeholders, Chief Information Security Officers (CISOs),are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide. | Among application security stakeholders, Chief Information Security Officers (CISOs),are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide. | ||
− | |||
==Introduction== | ==Introduction== | ||
− | The purpose of this document is to guide | + | The purpose of this document is to guide CISOs and managers of security DevOps in managing application security from initial problem statement to delivery of the solution. We start this journey in part I by providing guidance on how to start an application security initiative such as with the creation of the business cases for investing in application security following with awareness of threats targeting applications. In part II we focus on how to create an application security program including the adoption of secure software development activities, application security tools and secure code training for developers. In part III we focus on managing application security from both program execution as well as from risk management strategy perspectives including the mitigation of the risk of vulnerabilities and the metrics and reporting them based upon risk and exposure. In part IV we focus on process improvements such as the use of software maturity models and the lesson learned from security incidents whose root causes might have been identified in exploit of application vulnerabilities. |
− | |||
==Objectives== | ==Objectives== | ||
Line 37: | Line 35: | ||
==Licensing== | ==Licensing== | ||
+ | |||
The OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | The OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
© OWASP Foundation | © OWASP Foundation | ||
− | | valign="top" | + | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | |
== Core Content == | == Core Content == | ||
Line 54: | Line 53: | ||
== Presentation == | == Presentation == | ||
− | [[File:https://www.owasp.org/ | + | [[File:CISO_AppSec_Guide_USA_2017_Small.jpg|link=https://www.owasp.org/images/b/bf/2017-CISO-Guide-Reboot-Morana_AppSec_USA_Short.pdf]] |
− | + | Presentation given at OWASP AppSec USA 2017 Project Meeting | |
== Project Leader == | == Project Leader == | ||
− | Marco Morana | + | [https://www.owasp.org/index.php/Marco_Morana Marco Morana] |
− | |||
== Related Projects == | == Related Projects == | ||
Line 68: | Line 66: | ||
* [[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model]] | * [[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model]] | ||
+ | | valign="top" style="padding-left:25px;width:200px;" | | ||
+ | == Quick Access == | ||
− | | | + | * Application Security Guide For CISOs v2.0 EN (Work in Progress) |
+ | ** [[Application Security Guide For CISOsVs2|HTML]] | ||
− | + | * Application Security Guide For CISOs v1.0 EN (Release Edition) | |
− | |||
− | * Application Security Guide For CISOs v1.0 EN | ||
** [[Application Security Guide For CISOs |HTML]] | ** [[Application Security Guide For CISOs |HTML]] | ||
** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF] | ** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF] | ||
** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy] | ** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy] | ||
+ | * Versión Uno en español | ||
+ | ** La [[Guía de Seguridad en Aplicaciones para CISOs]] (Español) fue editada y corregida por Mauro Gioino, Mauro Graziosi y [[User:Cristian_Borghello|Cristian Borghello]]. | ||
== News and Events == | == News and Events == | ||
− | * [ | + | * [19-22 Sep 2017] The [https://2017.appsecusa.org/schedule/ CISO Guide Version 2 Reboot] was presented at [https://2017.appsecusa.org AppSec USA] |
− | * [ | + | * [12-16 June 2017] [https://github.com/OWASP/owasp-summits/blob/master/Outcomes/CISO/Application-Security-Guide-for-CISO.md Outcomes Of Discussions For CISO Guide Version 2] at [https://owaspsummit.org 2017 OWASP Summit in UK] |
− | |||
− | |||
− | |||
− | |||
− | [ | ||
− | |||
− | |||
− | |||
==Classifications== | ==Classifications== | ||
Line 96: | Line 89: | ||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | align="center" valign="top" width="50% | + | | rowspan="2" align="center" valign="top" width="50%" | [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]] |
− | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]] | + | | align="center" valign="top" width="50%" | [[File:Owasp-builders-small.png|link=Builders]] |
|- | |- | ||
− | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=Defenders]] | + | | align="center" valign="top" width="50%" | [[File:Owasp-defenders-small.png|link=Defenders]] |
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] |
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]] |
|} | |} | ||
|} | |} | ||
− | |||
= Acknowledgements = | = Acknowledgements = | ||
==Volunteers== | ==Volunteers== | ||
− | + | We are currently assembly a team of volunteers to author, edit and review the guide version 2. List of names will be updated soon | |
− | + | = Road Map and Getting Involved = | |
− | |||
− | |||
− | |||
− | |||
− | |||
+ | * We rebooted the project (at AppSec USA 2017 Project Summit) create new version 2, wiki, GitHub repository | ||
+ | * We reactivated OWASP CISO mailing list | ||
+ | * We have created the stub for version 2 and structured the contents in four parts | ||
− | + | Next steps are: | |
− | + | * Develop the contents: as was discussed at OWASP Summit in London in June 2017 | |
− | * | + | * Create a mini 2018 CISO Survey to socialize with CISOs at CISO summits using Survey Monkey lists |
− | + | ||
− | + | The main goal is to produce a draft by 30/3/2018 and a reviewed version by end of June 2018 | |
Involvement in the development and promotion of the CISO Guide is actively encouraged. | Involvement in the development and promotion of the CISO Guide is actively encouraged. | ||
You do not have to be a security expert in order to contribute. | You do not have to be a security expert in order to contribute. | ||
Some of the ways you can help: | Some of the ways you can help: | ||
+ | * Develop the new contents | ||
+ | * Update the old contents | ||
* Review the text | * Review the text | ||
− | * | + | * Help with graphical design for the book and the diagrams |
+ | * Help to create the mini CISO survey linked to the CISO web page | ||
Please participate through the project's [https://lists.owasp.org/mailman/listinfo/owasp_application_security_guide_for_cisos mailing list]. | Please participate through the project's [https://lists.owasp.org/mailman/listinfo/owasp_application_security_guide_for_cisos mailing list]. | ||
− | = Releases = | + | = Stable Releases = |
== Current version == | == Current version == | ||
Line 144: | Line 137: | ||
** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF] | ** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF] | ||
** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy] | ** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy] | ||
− | |||
== Previous versions == | == Previous versions == | ||
Line 151: | Line 143: | ||
= Project About = | = Project About = | ||
− | |||
− | __NOTOC__ <headertabs /> | + | {{:Projects/OWASP_Application_Security_Guide_For_CISOs_Project | Project About }} |
+ | |||
+ | __NOTOC__ <headertabs></headertabs> | ||
− | [[Category:OWASP Project]] [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] | + | [[Category:OWASP Project]] |
+ | [[Category:OWASP_Builders]] | ||
+ | [[Category:OWASP_Defenders]] | ||
+ | [[Category:OWASP_Document]] |
Latest revision as of 09:14, 4 November 2017
OWASP Application Security Guide For CISOs (Version 2 - 2018 Edition)Among application security stakeholders, Chief Information Security Officers (CISOs),are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide. IntroductionThe purpose of this document is to guide CISOs and managers of security DevOps in managing application security from initial problem statement to delivery of the solution. We start this journey in part I by providing guidance on how to start an application security initiative such as with the creation of the business cases for investing in application security following with awareness of threats targeting applications. In part II we focus on how to create an application security program including the adoption of secure software development activities, application security tools and secure code training for developers. In part III we focus on managing application security from both program execution as well as from risk management strategy perspectives including the mitigation of the risk of vulnerabilities and the metrics and reporting them based upon risk and exposure. In part IV we focus on process improvements such as the use of software maturity models and the lesson learned from security incidents whose root causes might have been identified in exploit of application vulnerabilities. ObjectivesThe guide assists CISOs on how to manage application security through the phases of initiation, creation, management and process improvements. Tactical guidance is provided in the following aspects:
LicensingThe OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. © OWASP Foundation |
Core ContentThe guide provide guidance to CISO to start, create, manage and improve Application Security Programs. The contents are articulated in (four) parts:
PresentationPresentation given at OWASP AppSec USA 2017 Project Meeting Project LeaderRelated Projects |
Quick Access
News and Events
Classifications |
Volunteers
We are currently assembly a team of volunteers to author, edit and review the guide version 2. List of names will be updated soon
- We rebooted the project (at AppSec USA 2017 Project Summit) create new version 2, wiki, GitHub repository
- We reactivated OWASP CISO mailing list
- We have created the stub for version 2 and structured the contents in four parts
Next steps are:
- Develop the contents: as was discussed at OWASP Summit in London in June 2017
- Create a mini 2018 CISO Survey to socialize with CISOs at CISO summits using Survey Monkey lists
The main goal is to produce a draft by 30/3/2018 and a reviewed version by end of June 2018
Involvement in the development and promotion of the CISO Guide is actively encouraged. You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Develop the new contents
- Update the old contents
- Review the text
- Help with graphical design for the book and the diagrams
- Help to create the mini CISO survey linked to the CISO web page
Please participate through the project's mailing list.
Current version
v1.0 (Stable)
Previous versions
Pre 1.0 versions (alpha and betas) are in the wiki page history at https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs and sub-pages beginning in August 2011.
what | is this project? |
---|---|
Name: OWASP Application Security Guide For CISOs Project (home page) | |
Purpose:
Draft Version: More info about this project can be found in the introductory page of the guide Application Security Guide For CISOs | |
License: Creative Commons Attribution Share Alike 3.0 | |
who | is working on this project? |
Project Leader(s):
| |
how | can you learn more? |
Project Pamphlet: Not Yet Created | |
Project Presentation: View | |
Mailing list: Mailing List Archives | |
Project Roadmap: View | |
Main links: | |
Key Contacts | |
|