This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Application Security Verification Standard Project"

From OWASP
Jump to: navigation, search
(Download)
 
(471 intermediate revisions by 29 users not shown)
Line 1: Line 1:
{{OWASP Book|4576962}}
+
= Home =
 +
<div style="width:100%;height:90px;border:0,margin:0;overflow: hidden;">[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]</div>
 +
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 +
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
  
{| style="width:100%" border="0" align="center"
+
== What is ASVS? ==
! colspan="7" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT INFORMATION'''
 
|-
 
| style="width:15%; background:#7B8ABD" align="center"|'''Project Name'''
 
| colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">'''OWASP Application Security Verification Standard (ASVS) Project'''
 
|-
 
| style="width:15%; background:#7B8ABD" align="center"| '''Short Project Description'''
 
| colspan="6" style="width:85%; background:#cccccc" align="left"|
 
The primary aim of the OWASP ASVS Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing application security verification using a commercially-workable open standard. This standard can be used to establish a level of confidence in the security of web applications and web services.
 
|-
 
| style="width:15%; background:#7B8ABD" align="center"|'''Key Project Information'''
 
| style="width:14%; background:#cccccc" align="center"|Project Leader<br>[[User:Mike.boberski|Mike Boberski]]
 
| style="width:14%; background:#cccccc" align="center"|Project Contributors<br>[[User:Jeff Williams|Jeff Williams]]<br>[[User:Wichers|Dave Wichers]]
 
| style="width:14%; background:#cccccc" align="center"|[https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard '''Mailing List/Subscribe''']<br>
 
[mailto:Owasp-Application-Security-Verification-Standard(at)lists.owasp.org '''Mailing List/Use''']
 
| style="width:14%; background:#cccccc" align="center"|Licensed under:<br>[http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0]
 
| style="width:14%; background:#cccccc" align="center"| Release Quality Status: [[:Category:OWASP_Project_Assessment#Assessment_Scale_for_OWASP_DOCUMENTATION_Projects|Beta]]
 
| style="width:15%; background:#cccccc" align="center"| Project Type: [[:Category:OWASP_Project#Beta_Status_Projects|Documentation]]
 
|}
 
{| style="width:100%" border="0" align="center"
 
! colspan="6" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT MAIN LINKS'''
 
|-
 
| style="width:100%; background:#cccccc" align="center"|
 
Project Powerpoint Description: [https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt '''About OWASP ASVS''']
 
<br>OWASP ASVS - Web Application Edition (Beta) - [[:Image:OWASP ASVS Web Edition 2008 Beta.doc|'''Word''']] and [[:Image:OWASP ASVS Web Edition 2008 Beta.pdf|'''PDF''']] files.
 
<br>OWASP ASVS - Web Application Edition (Alpha) - [[:Image:OWASP ASVS Web Edition 2008 Alpha.doc|'''Word''']] and [[:Image:OWASP ASVS Web Edition 2008 Alpha.pdf|'''PDF''']] files.
 
|}
 
<br>
 
  
== Overview ==
+
The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development.
'''What is ASVS?'''
 
  
Whereas the OWASP Top Ten is a tool that provides web application security awareness, the OWASP Application Security Verification Standard (ASVS) is a commercially-workable open standard that defines ranges in coverage and levels of rigor that can be used to perform application security verifications. It is the very first standard that OWASP has published! There are currently versions only in English.
+
The primary aim of the '''OWASP Application Security Verification Standard (ASVS) Project''' is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind:
  
The primary aim of the OWASP ASVS Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing application security verification using a commercially-workable open standard. This standard can be used to establish a level of confidence in the security of web applications.
+
*'''Use as a metric''' - Provide application developers and application owners with a yardstick with which to assess the degree of trust that can be placed in their Web applications,
 +
*'''Use as guidance''' - Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and
 +
*'''Use during procurement''' - Provide a basis for specifying application security verification requirements in contracts.
  
'''Where did ASVS come from?'''
+
== OWASP ASVS 4.0 Released! ==
  
The OWASP ASVS project is led by Mike Boberski (Booz Allen Hamilton). The primary authors are Mike, Jeff Williams (Aspect Security), and Dave Wichers (Aspect Security). The ASVS is the result of the collection and consolidation of decades of collective subject matter expertise in application security. If you’d like to volunteer to help on the project, you can contact Mike at boberski_michael[at]bah.com.
+
Get the new version of the ASVS 4.0 from the Downloads page.
  
More information about the ASVS can be found [https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt here - OWASP ASVS Project's PowerPoint Presentation].
+
== Email List ==
  
== Announcements ==
+
[[Image:Asvs-bulb.jpg]] [https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard Project Email List]
* 12/8/2008 - OWASP ASVS Final assistance required! Please join the mailing list for more information and assignments.
 
  
* 12/5/2008 - OWASP ASVS exits the Summer of Code 2008! The Beta draft of the Web Application Edition is released! Mike Boberski, Jeff Williams, and Dave Wichers are the primary authors.
+
== Project Leaders ==
  
* 10/3/2008 - OWASP ASVS Alpha draft is released! Mike Boberski is the primary author.
+
* Daniel Cuthbert [mailto:Daniel.Cuthbert@owasp.org @]
 +
* Andrew van der Stock [mailto:vanderaj@owasp.org @]
 +
* Jim Manico [mailto:jim.manico@owasp.org @]
 +
* Mark Burnett
 +
* Josh C Grossman
  
* 4/16/2008 - [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Application_Security_Verification_Standard OWASP ASVS Summer of Code 2008 proposal] submitted by Mike Boberski wins!
+
== Related Projects ==
  
== Methodology ==
+
[[Image:Asvs-satellite.jpg]]'''OWASP Resources'''  
'''How does ASVS work?'''
 
  
The OWASP ASVS standard uses the term the ‘verifier’ to indicate the person or team that is reviewing the application against these requirements.  
+
*[https://www.owasp.org/index.php/OWASP_Proactive_Controls OWASP Top Ten Proactive Controls (2018)]
 +
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten Risks (2017)]
 +
*[https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series OWASP Cheatsheet Series]
  
It is a verifier’s responsibility to determine if an application meets all of the requirements at the level targeted by a review. If the application meets all the requirements for that level, then it can be considered an OWASP ASVS Level N application, where N is the verification level that application complied with.
 
  
If the application does not meet all the requirements for a particular level, but does meet all the requirements for a lower level of this standard, then it can be considered to have passed that level of verification.
+
| valign="top"  style="padding-left:25px;width:200px;" |
  
The OWASP ASVS defines verification and documentation requirements that are grouped on the basis of related coverage and level of rigor. Web application security verification is performed from a logical point of view by following (or attempting to follow) paths into and out of the application and performing analysis along those paths. The Standard defines four hierarchical levels (e.g., Level 2 requires more coverage and rigor than Level 1) as depicted in the figure below.
+
== GitHub Repo ==
 +
 
 +
[https://github.com/OWASP/ASVS/tree/master/4.0 ASVS GitHub Repo]
 +
 
 +
== Download ==
 +
 
 +
ASVS 4.0
 +
 
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.pdf English PDF (1.1 MB)]
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.docx English Word (560 kB)]
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.csv English CSV (65 kB)]
 +
 
 +
== News and Events ==
 +
 
 +
* [1 March 2019] ASVS 4.0 released!
 +
* [9 March 2018] [https://docs.google.com/spreadsheets/d/1ic7gsib--Cn4ujrA8rhvzuUmMFpQ2Jkl96SZDCEtqJg/edit?ts=5a6bafe1#gid=950526877 OWASP Application Security Verification Standard 3.1 Spreadsheet] created by August Detlefsen
 +
* [29 June 2016] [[Media:OWASP_Application_Security_Verification_Standard_3.0.1.pdf|Version 3.0.1]] released!
 +
* [9 Oct 2015] Version 3.0 released
 +
* [20 May 2015] "First Cut" Version 3.0 released
 +
* [11 Aug 2014] Version 2.0 released
 +
 
 +
==Classifications==
 +
 
 +
  {| width="200" cellpadding="2"
 +
  |-
 +
  | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]
 +
  | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] 
 +
  |-
 +
  | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
 +
  |-
 +
  | colspan="2" align="center"  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
 +
  |-
 +
  | colspan="2" align="center"  | [[File:Project_Type_Files_DOC.jpg|link=]]
 +
  |}
  
{| style="width:80%" border="0" align="center"
 
| align="center" |
 
|-
 
| style="width:100%; align="center"|[[Image:Levels.JPG]]
 
 
|}
 
|}
 
The Standard further defines constituent components for Levels 1 and 2 (e.g., verification at Level 1 requires meeting both Level 1A and 1B requirements). Applications may claim compliance to either Level 1A or 1B instead of Level 1, but making such claims is weaker than claiming Level 1. Similarly, applications may claim compliance to either Level 2A or 2B instead of Level 2, but making such claims is weaker than claiming Level 2.
 
  
== OWASP ASVS – Web Application Edition (Beta) Downloads ==
+
= Downloads =
* [[:Image:OWASP ASVS Web Edition 2008 Beta.pdf|PDF (530 KB)]]  
+
 
* [[:Image:OWASP ASVS Web Edition 2008 Beta.doc|Word (903 KB)]]
+
== GitHub Repo ==
 +
 
 +
[https://github.com/OWASP/ASVS/tree/master/4.0 ASVS GitHub Repo]
 +
 
 +
== Download ==
 +
 
 +
ASVS 4.0 (GitHub hosted)
 +
 
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.pdf English PDF (1.1 MB)]
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.docx English Word (560 kB)]
 +
* [https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.csv English CSV (65 kB)]
 +
 
 +
Translations are coming for Hindi. If you want ASVS in your language, please contact the leadership directly or on Slack, and let's make it happen!
 +
 
 +
ASVS 4.0 (OWASP.org hosted)
 +
 
 +
* OWASP ASVS v4.0 English [[Media:OWASP_Application_Security_Verification_Standard_4.0-en.pdf|PDF]]
 +
* OWASP ASVS v4.0 English [[Media:OWASP_Application_Security_Verification_Standard_4.0-en.docx|Word]]
 +
* OWASP ASVS v4.0 Persian [[Media:OWASP Application Security Verification Standard 4.0-FA_.pdf|PDF]]
 +
 
 +
= Acknowledgements =
 +
 
 +
== Volunteers ==
 +
 
 +
=== Version 3 (2015) ===
 +
 
 +
Project Leaders
 +
 
 +
*Daniel Cuthbert
 +
*Andrew van der Stock
 +
 
 +
Lead Author
 +
*Jim Manico
 +
 
 +
Other reviewers and contributors
 +
*Boy Baukema
 +
*Ari Kesäniemi
 +
*Colin Watson
 +
*François-Eric Guyomarc’h
 +
*Cristinel Dumitru
 +
*James Holland
 +
*Gary Robinson
 +
*Stephen de Vries
 +
*Glenn Ten Cate
 +
*Riccardo Ten Cate
 +
*Martin Knobloch
 +
*Abhinav Sejpal
 +
*David Ryan
 +
*Steven van der Baan
 +
*Ryan Dewhurst
 +
*Raoul Endres
 +
*Roberto Martelloni
 +
 
 +
=== Version 2 (2014) ===
 +
 
 +
Project leaders
 +
*Sahba Kazerooni
 +
*Daniel Cuthbert
 +
 
 +
Lead authors
 +
*Andrew van der Stock
 +
*Sahba Kazerooni
 +
*Daniel Cuthbert
 +
*Krishna Raja
 +
 
 +
Other reviewers and contributors
 +
*Jerome Athias
 +
*Boy Baukema
 +
*Archangel Cuison
 +
*Sebastien.Deleersnyder
 +
*Antonio Fontes
 +
*Evan Gaustad
 +
*Safuat Hamdy
 +
*Ari Kesäniemi
 +
*Scott Luc
 +
*Jim Manico
 +
*Mait Peekma
 +
*Pekka Sillanpää
 +
*Jeff Sergeant
 +
*Etienne Stalmans
 +
*Colin Watson
 +
*Dr. Emin İslam Tatlı
 +
 
 +
Translators
 +
*Abbas Javan Jafari (Persian)
 +
*Sajjad Pourali (Persian)
 +
 
 +
 
 +
=== Version 2009 ===
 +
 
 +
Project leader
 +
*Mike Boberski
 +
 
 +
Lead authors
 +
*Mike Boberski
 +
*Jeff Williams
 +
*Dave Wichers
 +
 
 +
Other reviewers and contributors
 +
 
 +
Pierre Parrend (OWASP Summer of Code), Andrew van der Stock, Nam Nguyen, John Martin, Gaurang Shah, Theodore Winograd, Stan Wisseman, Barry Boyd, Steve Coyle, Paul Douthit, Ken Huang, Dave Hausladen, Mandeep Khera Scott Matsumoto, John Steven, Stephen de Vries, Dan Cornell, Shouvik Bardhan, Dr. Sarbari Gupta, Eoin Keary, Richard Campbell, Matt Presson, Jeff LoSapio, Liz Fong, George Lawless, Dave van Stein, Terrie Diaz, Ketan Dilipkumar Vyas, Bedirhan Urgun, Dr. Thomas Braun, Colin Watson, Jeremiah Grossman.
 +
 
 +
== OWASP Summer of Code 2008 ==
 +
 
 +
The OWASP Foundation sponsored the OWASP Application Security Verification Standard Project during the OWASP Summer of Code 2008.
 +
 
 +
= Glossary =
 +
 
 +
[[Image:Asvs-letters.jpg]]'''ASVS Terminology'''
 +
 
 +
*'''Access Control''' – A means of restricting access to files, referenced functions, URLs, and data based on the identity of users and/or groups to which they belong.
 +
*'''Application Component''' An individual or group of source files, libraries, and/or executables, as defined by the verifier for a particular application.
 +
*'''Application Security''' – Application-level security focuses on the analysis of components that comprise the application layer of the Open Systems Interconnection Reference Model (OSI Model), rather than focusing on for example the underlying operating system or connected networks.
 +
*'''Application Security Verification''' – The technical assessment of an application against the OWASP ASVS.
 +
*'''Application Security Verification Report''' – A report that documents the overall results and supporting analysis produced by the verifier for a particular application.
 +
*'''Application Security Verification Standard (ASVS)''' – An OWASP standard that defines four levels of application security verification for applications.
 +
*'''Authentication''' – The verification of the claimed identity of an application user.
 +
*'''Automated Verification''' – The use of automated tools (either dynamic analysis tools, static analysis tools, or both) that use vulnerability signatures to find problems.
 +
*'''Back Doors''' – A type of malicious code that allows unauthorized access to an application.
 +
*'''Blacklist''' – A list of data or operations that are not permitted, for example a list of characters that are not allowed as input.
 +
*'''Common Criteria (CC)''' – A multipart standard that can be used as the basis for the verification of the design and implementation of security controls in IT products.
 +
*'''Communication Security''' – The protection of application data when it is transmitted between application components, between clients and servers, and between external systems and the application.
 +
*'''Design Verification''' – The technical assessment of the security architecture of an application.
 +
*'''Internal Verification''' – The technical assessment of specific aspects of the security architecture of an application as defined in the OWASP ASVS.
 +
*'''Cryptographic module''' – Hardware, software, and/or firmware that implements cryptographic algorithms and/or generates cryptographic keys.
 +
*'''Denial of Service (DOS) Attacks''' – The flooding of an application with more requests than it can handle.
 +
*'''Dynamic Verification''' – The use of automated tools that use vulnerability signatures to find problems during the execution of an application.
 +
*'''Easter Eggs''' – A type of malicious code that does not run until a specific user input event occurs.
 +
*'''External Systems''' – A server-side application or service that is not part of the application.
 +
*'''FIPS 140-2''' – A standard that can be used as the basis for the verification of the design and implementation of cryptographic modules
 +
*'''Input Validation''' – The canonicalization and validation of untrusted user input.
 +
*'''Malicious Code''' – Code introduced into an application during its development unbeknownst to the application owner which circumvents the application’s intended security policy. Not the same as malware such as a virus or worm!
 +
*'''Malware''' – Executable code that is introduced into an application during runtime without the knowledge of the application user or administrator.
 +
*'''Open Web Application Security Project (OWASP)''' – The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. See: http://www.owasp.org/
 +
*'''Output Validation''' – The canonicalization and validation of application output to Web browsers and to external systems.
 +
*'''OWASP Enterprise Security API (ESAPI)''' – A free and open collection of all the security methods that developers need to build secure Web applications. See: http://www.owasp.org/index.php/ESAPI
 +
*'''OWASP Risk Rating Methodology''' – A risk rating methodology that has been customized for application security. See: http://www.owasp.org/index.php/How_to_value_the_real_risk
 +
*'''OWASP Testing Guide''' – A document designed to help organizations understand what comprises a testing program, and to help them identify the steps needed to build and operate that testing program. See: http://www.owasp.org/index.php/Category:OWASP_Testing_Project
 +
*'''OWASP Top Ten''' – A document that represents a broad consensus about what the most critical Web application security flaws are. See: http://www.owasp.org/index.php/Top10
 +
*'''Positive''' – See whitelist.
 +
*'''Salami Attack''' – A type of malicious code that is used to redirect small amounts of money without detection in financial transactions.
 +
*'''Security Architecture''' – An abstraction of an application’s design that identifies and describes where and how security controls are used, and also identifies and describes the location and sensitivity of both user and application data.
 +
*'''Security Control''' – A function or component that performs a security check (e.g. an access control check) or when called results in a security effect (e.g. generating an audit record).
 +
*'''Security Configuration''' – The runtime configuration of an application that affects how security controls are used.
 +
*'''Static Verification''' – The use of automated tools that use vulnerability signatures to find problems in application source code.
 +
*'''Target of Verification (TOV)''' – If you are performing an application security verification according to the OWASP ASVS requirements, the verification will be of a particular application. This application is called the "Target of Verification" or simply the TOV.
 +
*'''Threat Modeling''' - A technique consisting of developing increasingly refined security architectures to identify threat agents, security zones, security controls, and important technical and business assets.
 +
*'''Time Bomb''' – A type of malicious code that does not run until a preconfigured time or date elapses.
 +
*'''Verifier''' - The person or team that is reviewing an application against the OWASP ASVS requirements.
 +
*'''Whitelist''' – A list of permitted data or operations, for example a list of characters that are allowed to perform input validation.
 +
 
 +
= ASVS Users  =
 +
[[Image:Asvs-handshake.JPG]]
 +
 
 +
A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including [http://www.aspectsecurity.com Aspect Security], [http://www.astyran.com Astyran], [http://www.boozallen.com Booz Allen Hamilton], [http://casabasecurity.com Casaba Security], [http://www.cgi.com/web/en/industries/governments/us_federal/services_solutions.htm CGI Federal], [http://denimgroup.com Denim Group], [http://etebaran.com Etebaran Informatics], [http://www.mindedsecurity.com Minded Security], [http://www.nixu.com Nixu], [http://www.pstestware.com/ ps_testware], [http://www.proactiverisk.com Proactive Risk], [http://quince.co.uk Quince Associates Limited (SeeMyData)], [http://www.serpro.gov.br/ Serviço Federal de Processamento de Dados (SERPRO)], [http://www.udistrital.edu.co/ Universidad Distrital Francisco José de Caldas] Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached [mailto:sahba@securitycompass.com here].
 +
 
 +
= Precedents-Interpretations =
 +
 
 +
'''PI-0001: Are there levels between the levels?'''
 +
 
 +
*Issue: Are there levels between the levels for the cases where "The specification for an application may require OWASP ASVS Level N, but it could also include other additional detailed requirements such as from a higher ASVS level"?
 +
*Resolution: No. Use of alternate level definitions or notations such as "ASVS Level 1B+" is discouraged.
 +
*References: ASVS section "Application Security Verification Levels"
 +
 
 +
'''PI-0002: Is use of a master key simply another level of indirection?'''
 +
 
 +
*Issue: If a master key is stored as plaintext, isn't using a master key simply another level of indirection?
 +
*Resolution: No. There is a strong rationale for having a "master key" stored in a secure location that is used to encrypt all other secrets. In many applications, there are lots of secrets stored in many different locations. This greatly increases the likelihood that one of them will be compromised. Having a single master key makes managing the protection considerably simpler and is not simply a level of indirection.
 +
*References: ASVS verification requirement V2.14
 +
 
 +
'''PI-0003: What is a "TOV" or "Target of Verification"?'''
 +
 
 +
*Issue: New terminology
 +
*Resolution: If you are performing an application security verification according to ASVS, the verification will be of a particular application. This application is called the "Target of Verification" or simply the TOV. The TOV should be identified in verification documentation as follows:
 +
**TOV Identification – &lt;name and version of the application&gt; or &lt;Application name&gt;, &lt;application version&gt;, dynamic testing was performed in a staging environment, not the production environment
 +
**TOV Developer – &lt;insert name of the developer or verification customer&gt;
 +
*References: ASVS section "Approach"
 +
 
 +
= Internationalization =
 +
 
 +
[[Image:Asvs-writing.JPG]]
 +
If you can help with translations, please download the latest draft here:
 +
 
 +
https://github.com/OWASP/ASVS
 +
 
 +
If there are any incomprehensible English idiom or phrases in there, please don't hesitate to ask for clarification, because if it's hard to translate, it's almost certainly wrong in English as well. We recommend logging translation issues in GitHub, too, so please make yourself known.
 +
 
 +
Translations are coordinated through OWASP's Crowd In account, so you don't have to do the entire thing yourself.
 +
 
 +
https://crowdin.com/project/owasp-asvs/
 +
 
 +
You don't HAVE to use Crowd In, but it would be nice to indicate to other native speakers of your language that you are willing to work together. This is a 70 page document, and in all honesty, will take a dedicated person a week or more to translate, so please please please work together rather than apart. You have full access to the original document and the original images, so you have everything I have.
 +
 
 +
= Archive - Previous Version =
 +
 
 +
'''*Please note that the current version of ASVS is v4.0.  The information on this page is for archival purposes only.*'''
 +
 
 +
'''Application Security Verification Standard 3.0.1 '''
 +
 
 +
== ASVS 3.0.1 in English ==
 +
* [[Media:OWASP_Application_Security_Verification_Standard_3.0.1.pdf|Download PDF - 1.7 MB]]
 +
* [[Media:OWASP_Application_Security_Verification_Standard_3.0.1.docx|Download Word - 835 kB]]
 +
 
 +
== ASVS 3.0.1 in Spanish==
 +
* [[Media:Estándar_de_Verificación_de_Seguridad_en_Aplicaciones_3.0.1.pdf|Download PDF - 1.7 MB]]
 +
* [[Media:Estándar_de_Verificación_de_Seguridad_en_Aplicaciones_3.0.1.docx|Download Word - 835 kB]]
 +
 
 +
== ASVS 3.0.1 in Polish==
 +
* [[Media:OWASP Application Security Verification Standard 3.0.1 PL.pdf|Download PDF - 1.5 MB]]
 +
 
 +
== ASVS 3.0.1 in Persian==
 +
* [[Media:OWASP ASVS 3.0.1 (Persian).pdf|Download PDF - 2.84 MB]]
 +
 
 +
We are looking for translators for this version. If you can help us, please contact the project mail list!
 +
 
 +
'''Legacy Application Security Verification Standard 3.0'''
  
== OWASP ASVS – Web Application Edition (Alpha) Downloads ==
+
== ASVS 3.0 in English ==
OWASP ASVS Alpha (English)
+
* [[Media:OWASPApplicationSecurityVerificationStandard3.0.pdf|download PDF - 1.2 MB]]
 +
* [[Media:ASVS-excel.xlsx|ASVS 3.0 excel sheet  - 39 kB]]
  
* [[:Image:OWASP ASVS Web Edition 2008 Alpha.pdf|PDF (477 KB)]]
+
== Older versions ==
* [[:Image:OWASP ASVS Web Edition 2008 Alpha.doc|Word (868 KB)]]
 
  
== Feedback ==
+
'''Application Security Verification Standard 2.0 (final)'''
Please let us know how your organization is using the OWASP ASVS. Include your name, organization's name, and brief description of how you are using the ASVS. Thanks for supporting OWASP!
 
  
We hope you find the information in the OWASP ASVS useful. Please contribute back to the project by sending your comments, questions, and suggestions to [mailto:Owasp-Application-Security-Verification-Standard(at)lists.owasp.org '''owasp-application-security-verification-standard(at)lists.owasp.org''']. Thanks!
+
* ASVS 2.0 in English ([[Media:OWASP_ASVS_Version_2.pdf|download PDF - 1.6 MB]])
 +
* ASVS 2.0 in English ([[Media:OWASP_ASVS_Version_2.docx|download Word - 1.0MB]])
 +
* ASVS 2.0 in Persian ([[Media:OWASP_ASVS_Version_2_Persian.pdf|download PDF - 1.6MB]])
 +
* ASVS 2.0 in Polish (checklist) ([[Media:Asvs_2_PL.xlsx|download Excel]])
  
To join the OWASP ASVS mailing list or view the archives, please visit the [https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard '''subscription page'''].
+
'''Application Security Verification Standard 1.0 - 2009'''
  
== Project Sponsors ==
+
* ASVS 1.0 Final (English) ([[Media:OWASP_ASVS_2009_Web_App_Std_Release.pdf|download PDF - 2.5 MB]])
The OWASP ASVS project is co-sponsored by:
+
* ASVS 1.0 Final (English) ([[Media:OWASP_ASVS_2009_Web_App_Std_Release.doc|download Word - 2.3 MB]])
  
{| style="width:100%" border="0" align="center"
+
[[Image:Asvs-step1.jpg]]'1. About ASVS 1.0'
| align="left" |
+
 
|-
+
*Video presentation in English [https://www.youtube.com/watch?v=Ba6ncpIfaJA (YouTube)]
| style="width:100%; align="left"|[[Image:Aspect logo.jpg]] [[Image:Bah logo 1.jpg]] [[Image:SoC 08 Logo Mike Project.jpg]]  
+
*ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)]
|}
+
 
 +
[[Image:Asvs-step2.jpg]]'2. Get ASVS 1.0'
 +
 
 +
*ASVS in Bahasa Indonesia (Indonesian language) ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-id.pdf PDF])
 +
*ASVS in Bahasa Malaysia (Malay) (Currently under development!)
 +
*ASVS in Chinese(Currently under development!)
 +
*ASVS in English ([http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf PDF], [http://www.owasp.org/images/3/35/OWASP_ASVS_2009_Web_App_Std_Release.doc Word], [http://code.google.com/p/owasp-asvs/wiki/ASVS '''Online'''], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-xml.zip XML])
 +
*ASVS in French ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.odt OpenOffice])
 +
*ASVS in German ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-de.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-de.doc Word])
 +
*ASVS in Hungarian (Currently under development!)
 +
*ASVS in Japanese ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.doc Word])
 +
*ASVS in Persian (Farsi) ([http://abiusx.com/archive/document/OWASP-ASVS-fa-20111115.pdf PDF]) beta 0.7
 +
*ASVS in Polish ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-pl.pdf PDF])
 +
*ASVS in Portuguese-Brazil ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-pt-br.pdf PDF])
 +
*ASVS in Spanish (Currently under development!)
 +
*ASVS in Thai (Currently under development!)
 +
 
 +
[[Image:Asvs-step3.jpg]]'3. Learn ASVS 1.0'
 +
 
 +
*ASVS Article: Getting Started Using ASVS ([http://www.owasp.org/images/f/f8/OWASP_ASVS_Article_-_Getting_Started_Using_ASVS.pdf PDF])
 +
*ASVS Article: Code Reviews and Other Verification Activities: USELESS Unless Acted Upon IMMEDIATELY [http://www.owasp.org/index.php/Code_Reviews_and_Other_Verification_Activities:_USELESS_Unless_Acted_Upon_IMMEDIATELY (Wiki)]
 +
*ASVS Article: Agile Software Development: Don't Forget EVIL User Stories ([http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories Wiki])
 +
*ASVS Article: Man vs. Code ([http://www.owasp.org/index.php/Man_vs._Code Wiki])
 +
*ASVS Article: Getting started designing for a level of assurance ([http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf PDF])
 +
*ASVS Template: Sample verification fee schedule template ([http://www.owasp.org/index.php/Image:Sample_ASVS_Fee_Schedule_Template.xls Excel])
 +
*ASVS Template: Sample verification report template ([http://www.owasp.org/index.php/Image:Sample_ASVS_Report_Template.doc Word])
 +
*ASVS Training: An ASVS training presentation ([http://www.owasp.org/index.php/Image:OWASP_AU_Secure_Architecture_and_Coding.ppt PowerPoint])
 +
*ASVS Presentation: Executive-Level Presentation ([http://www.owasp.org/images/9/99/About_OWASP_ASVS_Executive_Presentation.ppt PowerPoint])
 +
*ASVS Presentation: Presentation Abstract ([http://www.owasp.org/images/1/10/OWASP_ASVS_Presentation_Abstract.doc Word])
 +
*Articles [http://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project#Articles_Below_-_More_About_ASVS_and_Using_It (More About ASVS and Using It)]
 +
 
 +
 
 +
__NOTOC__ <headertabs />
  
[[:Project Information:template Application Security Verification Standard|Click here to see this project's full SoC 2008 status.]]
+
[[Category:OWASP_Project|Application Security Verification Standard Project]]
[[Category:OWASP Project]]
+
[[Category:OWASP_Document]]
 +
[[Category:OWASP_Download]]
 +
[[Category:OWASP_Release_Quality_Document|OWASP Stable Quality Document]]
 +
[[Category:SAMM-CR-1]]
 +
[[Category:SAMM-DR-2]]
 +
[[Category:SAMM-ST-3]]

Latest revision as of 16:01, 25 October 2019

Flagship big.jpg

What is ASVS?

The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development.

The primary aim of the OWASP Application Security Verification Standard (ASVS) Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind:

  • Use as a metric - Provide application developers and application owners with a yardstick with which to assess the degree of trust that can be placed in their Web applications,
  • Use as guidance - Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and
  • Use during procurement - Provide a basis for specifying application security verification requirements in contracts.

OWASP ASVS 4.0 Released!

Get the new version of the ASVS 4.0 from the Downloads page.

Email List

Asvs-bulb.jpg Project Email List

Project Leaders

  • Daniel Cuthbert @
  • Andrew van der Stock @
  • Jim Manico @
  • Mark Burnett
  • Josh C Grossman

Related Projects

Asvs-satellite.jpgOWASP Resources


GitHub Repo

ASVS GitHub Repo

Download

ASVS 4.0

News and Events

Classifications

Owasp-flagship-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg