This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Projects/OWASP Framework Matrix"
From OWASP
Line 9: | Line 9: | ||
| align="center" style="background:#f0f0f0;"|'''Under Development?''' | | align="center" style="background:#f0f0f0;"|'''Under Development?''' | ||
| align="center" style="background:#f0f0f0;"|'''Contact Point''' | | align="center" style="background:#f0f0f0;"|'''Contact Point''' | ||
+ | |- | ||
+ | | || Automatic escaping in templates || || || || || | ||
+ | |- | ||
+ | | || Prepared statements (including ORM) || || || || || | ||
|- | |- | ||
| Django||x-frame-options||Present||No||[https://docs.djangoproject.com/en/dev/ref/clickjacking/#setting-x-frame-options-for-all-responses link]||n/a||n/a | | Django||x-frame-options||Present||No||[https://docs.djangoproject.com/en/dev/ref/clickjacking/#setting-x-frame-options-for-all-responses link]||n/a||n/a | ||
Line 17: | Line 21: | ||
|- | |- | ||
| Rails||Automatic CSRF protection||Present||Yes||[http://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf link]||n/a||n/a | | Rails||Automatic CSRF protection||Present||Yes||[http://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf link]||n/a||n/a | ||
+ | |- | ||
+ | | || Offsite redirect detection/prevention || || || || || | ||
+ | |- | ||
+ | | || javascript: URIs in links || || || || || | ||
+ | |- | ||
+ | | || Error suppression in production environments || || || || || | ||
+ | |- | ||
+ | | || Mask sensitive data in logs || || || || || | ||
+ | |- | ||
+ | | || Encryption abstractions || || || || || | ||
+ | |- | ||
+ | | || Prepared statement support || || || || || | ||
+ | |- | ||
+ | | || Strict transport security || || || || || | ||
+ | |- | ||
+ | | || Content security policy || || || || || | ||
|} | |} |
Revision as of 17:08, 15 September 2013
Note: This page is a template part of the OWASP Framework Security Project. Edit this page here
Framework | Security Control | Present / Not Present | Enabled By Default | Link to more info | Under Development? | Contact Point |
Automatic escaping in templates | ||||||
Prepared statements (including ORM) | ||||||
Django | x-frame-options | Present | No | link | n/a | n/a |
Django | SECURE Cookie Flag | Present | No | link | n/a | n/a |
Django | HTTPOnly Cookie Flag | ? | ? | [# link] | ? | ? |
Rails | Automatic CSRF protection | Present | Yes | link | n/a | n/a |
Offsite redirect detection/prevention | ||||||
javascript: URIs in links | ||||||
Error suppression in production environments | ||||||
Mask sensitive data in logs | ||||||
Encryption abstractions | ||||||
Prepared statement support | ||||||
Strict transport security | ||||||
Content security policy |