This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Good Component Practices Project"
From OWASP
Mark Miller (talk | contribs) |
Mark Miller (talk | contribs) m |
||
Line 13: | Line 13: | ||
</ol> | </ol> | ||
− | We will look at each level of vulnerability and establish a series of best practices for managing the component usage at that level | + | We will look at each level of vulnerability and establish a series of best practices for managing the component usage at that level |
− | [[User:Mark Miller|Mark Miller]] | + | |
+ | [[User:Mark Miller|Mark Miller]] 22:04, 24 April 2013 (UTC) | ||
=Project About= | =Project About= |
Revision as of 22:04, 24 April 2013
Main
This project will document a set of best practices for managing component vulnerability at three main gateways.
Gateways of Component Vulnerability
When establishing a framework for Good Component Practices, there are three gateways at which a vulnerability may occur:
- Provenance of the component, where does it come from?
- Integration of the component into the development environment
- Integration of the component into the production environment
We will look at each level of vulnerability and establish a series of best practices for managing the component usage at that level
Mark Miller 22:04, 24 April 2013 (UTC)
Project About
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|