|
|
Line 4: |
Line 4: |
| | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | |
| | | |
− | | + | ==OWASP Security Ninja == |
− | TEMPORARY NOTE: There is an existing project called the OWASP Security Ninjas Training Program, sponsored by OpenDNS. The project is a single module with labs training class. They used the Ninja metaphor, but not as the backdrop and marketing focus we would do with this new project. I am requesting that the existing Security Ninjas Training modify or relinquish their name.
| |
− | | |
− | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
| |
− | <span style="color:#ff0000">
| |
− | Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.
| |
− | </span>
| |
− | | |
− | ==The OWASP Security Principles== | |
| | | |
| <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> |
Line 19: |
Line 11: |
| </span> | | </span> |
| | | |
− | Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.
| |
− |
| |
− | For example, security design happens with perhaps a handful of principles:
| |
− |
| |
− | * Least Privilege
| |
− | * Perimeter Security
| |
− | * Defence in Depth
| |
− |
| |
− | However, we regularly see designs without '''separation of privilege'''!
| |
− |
| |
− | Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!
| |
− |
| |
− | The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.
| |
| | | |
| ==Description== | | ==Description== |