This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Application Security Program Quick Start Guide"
Gabrielgumbs (talk | contribs) (→Day 1) |
Gabrielgumbs (talk | contribs) (→Audience) (Tag: Visual edit) |
||
(17 intermediate revisions by 2 users not shown) | |||
Line 9: | Line 9: | ||
=== Preface === | === Preface === | ||
− | This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security | + | This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application. |
The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. | The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. | ||
Line 22: | Line 22: | ||
=== Audience === | === Audience === | ||
− | The intended audience of this document is anyone from security engineers, developers, | + | The intended audience of this document is anyone from security engineers, developers, product managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions (and examples of answers) that should be asked by those who are in accountable for the application security program in your organization, along with those responsible for managing the risk of the entire organization. |
== [[Day 1]] == | == [[Day 1]] == | ||
Line 32: | Line 32: | ||
== [[Day 2]] == | == [[Day 2]] == | ||
− | ''''' | + | ''''' Key Activities: ''''' |
− | *Asset Discovery | + | *[[Day_2#Asset Discovery|Asset Discovery]] |
− | *Asset Risk Prioritization | + | *[[Day_2#Asset Risk Prioritization|Asset Risk Prioritization]] |
− | *Communication Plan | + | *[[Day_2#Communication Plan|Communication Plan]] |
+ | |||
== [[Day 3]] == | == [[Day 3]] == | ||
− | ''''' | + | ''''' Key Activities: ''''' |
− | *Vulnerability Assessments | + | *[[Day_3#Vulnerability Assessments|Vulnerability Assessments]] |
− | *Vulnerability | + | *[[Day_3#Vulnerability Delivery|Vulnerability Delivery]] |
+ | |||
== [[Day 4]] == | == [[Day 4]] == | ||
− | ''''' | + | ''''' Key Activities: ''''' |
− | *Measured Metrics | + | *[[Day_4#Measured Metrics|Measured Metrics]] |
+ | |||
== [[Day 5]] == | == [[Day 5]] == | ||
− | ''''' | + | ''''' Key activities: ''''' |
− | *Compensating Controls | + | *[[Day_5#Compensating Controls|Compensating Controls]] |
− | *Mitigating Controls | + | *[[Day_5#Mitigating Controls|Mitigating Controls]] |
− | *Remediation Prioritization | + | *[[Day_5#Remediation Prioritization|Remediation Prioritization]] |
== Conclusion == | == Conclusion == | ||
Line 62: | Line 65: | ||
| width="100" style="max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;" cellpadding="0" | | | width="100" style="max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;" cellpadding="0" | | ||
− | |||
| width="30%" style="background:#eeeeee" | | | width="30%" style="background:#eeeeee" | | ||
Line 70: | Line 72: | ||
== Project lead and authors == | == Project lead and authors == | ||
− | * [ | + | * [https://twitter.com/GabrielGumbs Gabriel Gumbs] |
− | * [ | + | * [https://twitter.com/jeremiahg Jeremiah Grossman]] |
− | * [ | + | * [https://twitter.com/RSnake Robert Hansen] |
− | * [ | + | * [https://twitter.com/jerryhoff Jerry Hoff] |
− | + | * [https://twitter.com/mattjay Matt Johansen] | |
− | |||
− | |||
− | |||
− | |||
− | * [ | ||
− | |||
== Further Information == | == Further Information == | ||
Line 88: | Line 84: | ||
The OWASP Application Security Program Quick Start Guide is also available as | The OWASP Application Security Program Quick Start Guide is also available as | ||
− | * [https://www.owasp.org/images/5/53/OWASP_Quick_Start_Guide.pdf | + | *[https://www.owasp.org/images/9/97/OWASP_Quick_Start_Guide_v.1.0.docx Word Document] |
− | + | *[https://www.owasp.org/images/5/53/OWASP_Quick_Start_Guide.pdf Downloadable PDF] | |
For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page: | For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page: | ||
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page] | * [https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project The Application Security Program Quick Start Guide Project Page] | ||
− | |||
|} | |} |
Latest revision as of 23:15, 27 March 2018
The Application Security Program Quick Start GuidePrefaceThis guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program. The intended goal of the AppSec program is to implement measures throughout the code’s life-cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application. The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to:
The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas. AudienceThe intended audience of this document is anyone from security engineers, developers, product managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions (and examples of answers) that should be asked by those who are in accountable for the application security program in your organization, along with those responsible for managing the risk of the entire organization. Day 1Key Activities: Day 2Key Activities: Day 3Key Activities: Day 4Key Activities: Day 5Key activities: ConclusionSetting up an effective application security program does require commitment from all elements of the business, and a clear understanding of what resources need to be protected and what level of risk is acceptable. However, given that information, setting up an application security program need not be confusing, difficult, or complex. The keys to success involve planning, making key financial decisions, ensuring all roles and responsibilities are clearly assigned and that all stakeholders within the organization know what to expect. LicensingThe OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license. You are free to:
The licensor cannot revoke these freedoms as long as you follow the license terms. |
CreditsProject lead and authorsFurther InformationApplication Security Program Quick Start GuideThe OWASP Application Security Program Quick Start Guide is also available as For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page: |