This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Application Security Verification Standard Project"
| Line 1: | Line 1: | ||
= Home = | = Home = | ||
| − | + | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Cheatsheets-header.jpg|link=]]</div> | |
| − | |- valign="top" | + | |
| − | + | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | |
| + | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
| + | |||
The primary aim of the '''OWASP Application Security Verification Standard (ASVS) Project''' is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind: | The primary aim of the '''OWASP Application Security Verification Standard (ASVS) Project''' is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind: | ||
| Line 9: | Line 11: | ||
*'''Use as guidance''' - Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and | *'''Use as guidance''' - Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and | ||
*'''Use during procurement''' - Provide a basis for specifying application security verification requirements in contracts. | *'''Use during procurement''' - Provide a basis for specifying application security verification requirements in contracts. | ||
| − | |||
| − | + | == Did you know... == | |
| − | + | [[Image:Asvs-handshake.JPG]]'''ASVS Users''' | |
| − | + | ||
| − | + | A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including [http://www.aspectsecurity.com Aspect Security], [http://www.astyran.com Astyran], [http://www.boozallen.com Booz Allen Hamilton], [http://casabasecurity.com Casaba Security], [http://www.cgi.com/web/en/industries/governments/us_federal/services_solutions.htm CGI Federal], [http://denimgroup.com Denim Group], [http://etebaran.com Etebaran Informatics], [http://www.mindedsecurity.com Minded Security], [http://www.nixu.com Nixu], [http://www.pstestware.com/ ps_testware], [http://www.proactiverisk.com Proactive Risk], [http://quince.co.uk Quince Associates Limited (SeeMyData)], [http://www.serpro.gov.br/ Serviço Federal de Processamento de Dados (SERPRO)], [http://www.udistrital.edu.co/ Universidad Distrital Francisco José de Caldas] Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached [mailto:[email protected] here]. | |
| − | + | <br><br> | |
| − | + | ||
| − | |||
== Let's talk here == | == Let's talk here == | ||
| Line 26: | Line 26: | ||
*[https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard owasp-application-security-verification-standard mailing list (this is the main list)] | *[https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard owasp-application-security-verification-standard mailing list (this is the main list)] | ||
| − | |||
== Got translation cycles? == | == Got translation cycles? == | ||
| Line 35: | Line 34: | ||
*[http://owasp-project-management.googlecode.com/svn/trunk/documentation/asvs-translating.pdf Translation Onboarding Instructions]. | *[http://owasp-project-management.googlecode.com/svn/trunk/documentation/asvs-translating.pdf Translation Onboarding Instructions]. | ||
| − | |||
== Related resources == | == Related resources == | ||
| Line 46: | Line 44: | ||
*[http://www.owasp.org/index.php/Common_OWASP_Numbering OWASP Common Numbering] | *[http://www.owasp.org/index.php/Common_OWASP_Numbering OWASP Common Numbering] | ||
*[http://www.owasp.org/index.php/Category:OWASP_Newsletter#tab=Press_releases OWASP Press Releases] | *[http://www.owasp.org/index.php/Category:OWASP_Newsletter#tab=Press_releases OWASP Press Releases] | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
= Downloads = | = Downloads = | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
[[Image:Asvs-step1.jpg]]'''1. About ASVS''' | [[Image:Asvs-step1.jpg]]'''1. About ASVS''' | ||
| Line 75: | Line 56: | ||
*ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)] | *ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)] | ||
| − | |||
[[Image:Asvs-step2.jpg]]'''2. Get ASVS''' | [[Image:Asvs-step2.jpg]]'''2. Get ASVS''' | ||
| Line 100: | Line 80: | ||
*ASVS in Thai (Currently under development!) | *ASVS in Thai (Currently under development!) | ||
| − | |||
[[Image:Asvs-step3.jpg]]'''3. Learn ASVS''' | [[Image:Asvs-step3.jpg]]'''3. Learn ASVS''' | ||
| Line 114: | Line 93: | ||
*ASVS Presentation: Presentation Abstract ([http://www.owasp.org/images/1/10/OWASP_ASVS_Presentation_Abstract.doc Word]) | *ASVS Presentation: Presentation Abstract ([http://www.owasp.org/images/1/10/OWASP_ASVS_Presentation_Abstract.doc Word]) | ||
*Articles [http://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project#Articles_Below_-_More_About_ASVS_and_Using_It (More About ASVS and Using It)] | *Articles [http://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project#Articles_Below_-_More_About_ASVS_and_Using_It (More About ASVS and Using It)] | ||
| − | |||
| − | |||
| − | |||
| − | |||
= Glossary = | = Glossary = | ||
| Line 163: | Line 138: | ||
*'''Verifier''' - The person or team that is reviewing an application against the OWASP ASVS requirements. | *'''Verifier''' - The person or team that is reviewing an application against the OWASP ASVS requirements. | ||
*'''Whitelist''' – A list of permitted data or operations, for example a list of characters that are allowed to perform input validation. | *'''Whitelist''' – A list of permitted data or operations, for example a list of characters that are allowed to perform input validation. | ||
| − | |||
| − | |||
= Precedents-Interpretations = | = Precedents-Interpretations = | ||
Revision as of 13:46, 28 March 2014
|
The primary aim of the OWASP Application Security Verification Standard (ASVS) Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind:
Did you know...A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including Aspect Security, Astyran, Booz Allen Hamilton, Casaba Security, CGI Federal, Denim Group, Etebaran Informatics, Minded Security, Nixu, ps_testware, Proactive Risk, Quince Associates Limited (SeeMyData), Serviço Federal de Processamento de Dados (SERPRO), Universidad Distrital Francisco José de Caldas Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached here.
Let's talk hereFurther development of ASVS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please contact us. Got translation cycles?The ASVS project is always on the lookout for volunteers who are interested in translating ASVS into another language. Related resources
Application Security Verification Standard 2.0 (beta)
We are looking for translators for the final push. If you can help us, please contact the project mail list! Application Security Verification Standard 1.0 (final)
PI-0001: Are there levels between the levels?
PI-0002: Is use of a master key simply another level of indirection?
PI-0003: What is a "TOV" or "Target of Verification"?
Articles Below - More About ASVS and Using It
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Pages in category "OWASP Application Security Verification Standard Project"
The following 21 pages are in this category, out of 21 total.
H
- How to bootstrap the NIST risk management framework with verification activities
- How to bootstrap your SDLC with verification activities
- How to create verification project schedules
- How to perform a security architecture review at Level 1
- How to perform a security architecture review at Level 2
- How to specify verification requirements in contracts
- How to write verifier job requisitions


