This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Guidelines of OWASP"
From OWASP
(Added my suggestion) |
Dinis.cruz (talk | contribs) |
||
Line 8: | Line 8: | ||
− | == | + | ===What about=== |
− | + | The six OWASP Guides constitute the guidelines: | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
* CISO Guide | * CISO Guide | ||
Line 31: | Line 24: | ||
== Your ideas == | == Your ideas == | ||
− | + | * Owasp top 10?? | |
Latest revision as of 22:20, 17 October 2013
Section 2.7.4 item c) from the REGULATIONS document (which is aimed at laying down technical specifications for online collection systems pursuant to Regulation (EU) No 211/2011 of the European Parliament and of the Council on the citizens’ initiative), says that:
- Proper security configuration is in place, which requires, at least, that:
- ...
- e) security settings in the development frameworks and libraries are configured in accordance with best practices, such as the guidelines of OWASP."
So what does guidelines of OWASP actually means? This page aims at answering that question
What about
The six OWASP Guides constitute the guidelines:
- CISO Guide
- Development Guide
- Code Review Guide
- Testing Guide
- Verification Standard Guide
- Part 1 - ASVS for Web Applications
- Secure SDLC Guide (i.e. SAMM)
Your ideas
- Owasp top 10??
References
- EU Regulations PDF
- Guidelines of OWASP - Blog post