This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Controls in Web Application Development Lifecycle"

From OWASP
Jump to: navigation, search
m (FAQs)
m (Acknowledgements)
Line 101: Line 101:
 
==Contributors==
 
==Contributors==
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
 
<span style="color:#ff0000">
 
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project.
 
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project.
 
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.
 
</span>
 
  
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here].
 
  
 
The first contributors to the project were:
 
The first contributors to the project were:
  
* [https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves]
+
* [mailto:nilay.sangani@owasp.org]
* [https://github.com/sublimino Andrew Martin]
 
* [https://github.com/Lambdanaut Josh Thomas]
 
* '''YOUR NAME BELONGS HERE'''
 
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =

Revision as of 13:28, 30 October 2014

OWASP Project Header.jpg


The OWASP Security Controls in Web Application Development Lifecycle

Security needs to be embedded right from the initials to release a secure end deliverable. This project aims at delivering security controls right from the requirements,design,development,testing,release,maintenance and decommission.

Description

Vision of this project is to demonstrate the implementation of OWASP's secure design and development guidelines as working applications in all leading programming languages and platforms including .NET, JAVA, PHP, Android, iPhone, etc. All the dummy applications will be available as Fully Vulnerable and Fully Secure versions.

Vulnerable version will highlight the application security vulnerabilities, and can be used for Hands-on practice for application VAPT.

Secure version of the same application will map OWASP's security development guidelines in the code files, demonstrating secure coding.

User's can not only use the vulnerable apps for VAPT practice, but they will very easily be able to compare the vulnerable code with the secure code, from the secure version of the same application.

Developers will also be able to pick up security libraries from our secure version of the applications, to use them in their own applications and projects.

Licensing

GNU GPL v3 License


What is OWASP Security Controls in Web Application Development Lifecycle Project?

Project's tangible deliverable will be downloadable secure and vulnerable versions of dummy application in various programming languages including .NET, JAVA, PHP, Android, iPhone, etc.

Presentation

Project Leader

Nilav Sangani

Related Projects

Openhub

Quick Download

News and Events

In Print

Classifications

New projects.png Owasp-breakers-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg