This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Application Security Verification Standard Project"
Deleted user (talk | contribs) |
Deleted user (talk | contribs) |
||
| Line 7: | Line 7: | ||
* Video presentation in English [http://www.youtube.com/watch?v=1DBW1RbQnY4 (YouTube)] | * Video presentation in English [http://www.youtube.com/watch?v=1DBW1RbQnY4 (YouTube)] | ||
* Project presentation in English ([http://www.owasp.org/images/7/71/About_OWASP_ASVS.ppt PowerPoint]) | * Project presentation in English ([http://www.owasp.org/images/7/71/About_OWASP_ASVS.ppt PowerPoint]) | ||
| − | * Project presentation in French ([http://owasp-asvs.googlecode.com/ | + | * Project presentation in French ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-presentation-fr.ppt PowerPoint]) |
* Data sheet in English ([http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf PDF], [http://www.owasp.org/images/6/60/ASVS_One_Page_Handout.doc Word]) | * Data sheet in English ([http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf PDF], [http://www.owasp.org/images/6/60/ASVS_One_Page_Handout.doc Word]) | ||
* ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)] | * ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)] | ||
| Line 13: | Line 13: | ||
[[file:Asvs-step2.jpg ]]'''2. Get ASVS''' | [[file:Asvs-step2.jpg ]]'''2. Get ASVS''' | ||
| − | * ASVS in English ([http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf PDF], [http://www.owasp.org/images/3/35/OWASP_ASVS_2009_Web_App_Std_Release.doc Word], [http://code.google.com/p/owasp-asvs/wiki/ASVS HTML], [http://owasp-asvs.googlecode.com/ | + | * ASVS in English ([http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf PDF], [http://www.owasp.org/images/3/35/OWASP_ASVS_2009_Web_App_Std_Release.doc Word], [http://code.google.com/p/owasp-asvs/wiki/ASVS HTML], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-xml.zip XML]) |
| − | * ASVS in Japanese (Draft)([http://owasp-asvs.googlecode.com/ | + | * ASVS in Japanese (Draft)([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.doc Word]) |
| − | * ASVS in French (Draft)([http://owasp-asvs.googlecode.com/ | + | * ASVS in French (Draft)([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.odt OpenOffice]) |
* ASVS in German(Currently under development!) | * ASVS in German(Currently under development!) | ||
* ASVS in Chinese(Currently under development!) | * ASVS in Chinese(Currently under development!) | ||
Revision as of 18:34, 11 February 2010
Home
Start Here
Got Translation Cycles?The ASVS project is always on the lookout for volunteers who are interested in translating ASVS into another language. |
Let's Talk HereFurther development of ASVS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please contact us. Glossary
|
Related Resources
|
Precedents/Interpretations
PI-0001: Are there levels between the levels?
- Issue: Are there levels between the levels for the cases where "The specification for an application may require OWASP ASVS Level N, but it could also include other additional detailed requirements such as from a higher ASVS level"?
- Resolution: No. Use of alternate level definitions or notations such as "ASVS Level 1B+" is discouraged.
- References: ASVS section "Application Security Verification Levels"
PI-0002: Is use of a master key simply another level of indirection?
- Issue: If a master key is stored as plaintext, isn't using a master key simply another level of indirection?
- Resolution: No. There is a strong rationale for having a "master key" stored in a secure location that is used to encrypt all other secrets. In many applications, there are lots of secrets stored in many different locations. This greatly increases the likelihood that one of them will be compromised. Having a single master key makes managing the protection considerably simpler and is not simply a level of indirection.
- References: ASVS verification requirement V2.14
PI-0003: What is a "TOV" or "Target of Verification"?
- Issue: New terminology
- Resolution: If you are performing an application security verification according to ASVS, the verification will be of a particular application. This application is called the “Target of Verification” or simply the TOV. The TOV should be identified in verification documentation as follows:
- TOV Identification – <name and version of the application> or <Application name>, <application version>, dynamic testing was performed in a staging environment, not the production environment
- TOV Developer – <insert name of the developer or verification customer>
- References: ASVS section "Approach"
Users/Contributors
|
Project Leader Project Contributors |
Project Sponsorship |
Users A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including:
Organizations listed above are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached here. |
This project licensed under the Creative Commons Attribution ShareAlike 3.0.
Articles Below - More About ASVS and Using It
Pages in category "OWASP Application Security Verification Standard Project"
The following 21 pages are in this category, out of 21 total.
H
- How to bootstrap the NIST risk management framework with verification activities
- How to bootstrap your SDLC with verification activities
- How to create verification project schedules
- How to perform a security architecture review at Level 1
- How to perform a security architecture review at Level 2
- How to specify verification requirements in contracts
- How to write verifier job requisitions



