This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "GPC Project Details/OWASP Best Practices: Web Application Firewalls"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
 
| project_name = OWASP Best Practices: Web Application Firewalls  
 
| project_name = OWASP Best Practices: Web Application Firewalls  
 
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.
 
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.
| project_license = CC 2.0
+
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution Share Alike 3.0]
 
| leader_name = OWASP Germany Local Chapter
 
| leader_name = OWASP Germany Local Chapter
 
| leader_email = owasp-firewalls-project(at)lists.owasp.org
 
| leader_email = owasp-firewalls-project(at)lists.owasp.org

Revision as of 15:02, 21 October 2009

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What does this OWASP project release offer you?
what is this project?
OWASP Best Practices: Web Application Firewalls

Purpose: Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.

License: Creative Commons Attribution Share Alike 3.0

who is working on this project?
Project Leader: OWASP Germany Local Chapter @

Project Maintainer: Achim Hoffmann @

Project Contributor(s):

  • Maximilian Dermann
  • Mirko Dziadzka
  • Boris Hemkemeier
  • Alexander Meisel
  • Matthias Rohr
  • Thomas Schreiber
how can you learn more?
Project Pamphlet: N/A

3x slide Project Presentation: N/A

Mailing list: Subscribe or read the archives

Project Roadmap: To view, click here

Main links: N/A

Project Health: Yellow button.JPG Not Reviewed (Provisional)
To be reviewed under Assessment Criteria v2.0

Key Contacts
  • Contact OWASP Germany Local Chapter @ to contribute, review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Last Release - 3/2008 - [Deutsch, English (download)]

Release Leader: Achim Hoffmann

Release details: Main links, release roadmap and assessment

Rating: Yellow button.JPG Not Reviewed
To be reviewed under Assessment Criteria v2.0

other releases
  • First Release - 3/2008 - [Deutsch (download)]