This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Application Security Verification Standard Project"
Line 1: | Line 1: | ||
= Home = | = Home = | ||
− | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File: | + | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> |
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
Line 160: | Line 160: | ||
**TOV Developer – <insert name of the developer or verification customer> | **TOV Developer – <insert name of the developer or verification customer> | ||
*References: ASVS section "Approach" | *References: ASVS section "Approach" | ||
− | |||
− | |||
− | |||
− | |||
− | |||
= Project About = | = Project About = | ||
{{:Projects/OWASP Application Security Verification Standard Project| Project About}} | {{:Projects/OWASP Application Security Verification Standard Project| Project About}} | ||
− | __NOTOC__ <headertabs /> | + | __NOTOC__ <headertabs /> |
− | |||
− | |||
− | [[Category:OWASP_Project|Application Security Verification Standard Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document|OWASP Stable Quality Document]] | + | [[Category:OWASP_Project|Application Security Verification Standard Project]] |
+ | [[Category:OWASP_Document]] | ||
+ | [[Category:OWASP_Download]] | ||
+ | [[Category:OWASP_Release_Quality_Document|OWASP Stable Quality Document]] |
Revision as of 13:49, 28 March 2014
The primary aim of the OWASP Application Security Verification Standard (ASVS) Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind:
Did you know...A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including Aspect Security, Astyran, Booz Allen Hamilton, Casaba Security, CGI Federal, Denim Group, Etebaran Informatics, Minded Security, Nixu, ps_testware, Proactive Risk, Quince Associates Limited (SeeMyData), Serviço Federal de Processamento de Dados (SERPRO), Universidad Distrital Francisco José de Caldas Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached here.
Let's talk hereFurther development of ASVS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please contact us. Got translation cycles?The ASVS project is always on the lookout for volunteers who are interested in translating ASVS into another language. Related resources
Application Security Verification Standard 2.0 (beta)
We are looking for translators for the final push. If you can help us, please contact the project mail list! Application Security Verification Standard 1.0 (final)
PI-0001: Are there levels between the levels?
PI-0002: Is use of a master key simply another level of indirection?
PI-0003: What is a "TOV" or "Target of Verification"?
|
Pages in category "OWASP Application Security Verification Standard Project"
The following 21 pages are in this category, out of 21 total.
H
- How to bootstrap the NIST risk management framework with verification activities
- How to bootstrap your SDLC with verification activities
- How to create verification project schedules
- How to perform a security architecture review at Level 1
- How to perform a security architecture review at Level 2
- How to specify verification requirements in contracts
- How to write verifier job requisitions