This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Principle template"

From OWASP
Jump to: navigation, search
 
(8 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
Every '''[[Principle]]''' should follow this template.
 
Every '''[[Principle]]''' should follow this template.
 +
 +
{{Template:Principle}}
 +
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 +
 +
<br>
 +
[[Category:OWASP ASDR Project]]
 +
__TOC__
 +
  
 
==Description==
 
==Description==
Line 10: Line 19:
 
==Examples==
 
==Examples==
  
; Short example name
+
===Short example name===
: One paragraph example description with [http://www.site.com links]
+
: A short example description, small picture, or sample code with [http://www.site.com links]
  
; Short example name
+
===Short example name===
: One paragraph example description with [http://www.site.com links]
+
: A short example description, small picture, or sample code with [http://www.site.com links]
  
  
Line 23: Line 32:
  
  
==Related [[Countermeasures]]==
+
==Related [[Controls]]==
  
* [[Countermeasure 1]]
+
* [[Controls 1]]
* [[Countermeasure 2]]
+
* [[Controls 2]]
  
  
Line 32: Line 41:
  
 
* http://www.link1.com
 
* http://www.link1.com
* [http://www.link2.com Title for the link]
+
* [http://www.link2.com Title for the link2]
 
 
  
When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category
 
<nowiki>[[Category:OWASP Honeycomb Project]]</nowiki>
 
<nowiki>[[Category:OWASP ASDR Project]]</nowiki>
 
  
 
__NOTOC__
 
__NOTOC__

Latest revision as of 17:15, 10 May 2010

Every Principle should follow this template.


This is a principle or a set of principles. To view all principles, please see the Principle Category page.

Last revision (mm/dd/yy): 05/10/2010



Description

A principle is a simple rule that helps to guide security decisions in complex situations.

  1. Start with a one-sentence description of the principle
  2. Describe the principle and how it should be applied to security decisions


Examples

Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links


Related Vulnerabilities


Related Controls


References