This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:OWASP Top Ten Proactive Controls v2.pptx"

From OWASP
Jump to: navigation, search
(Jmanico uploaded a new version of "File:OWASP Top Ten Proactive Controls v2.pptx")
(Jmanico uploaded a new version of "File:OWASP Top Ten Proactive Controls v2.pptx")
(No difference)

Revision as of 03:05, 27 February 2016

The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development. 1: Parameterize Queries 2: Encode Data 3: Validate All Inputs 4: Implement Appropriate Access Controls 5: Establish Identity and Authentication Controls 6: Protect Data and Privacy 7: Implement Logging, Error Handling and Intrusion Detection 8: Leverage Security Features of Frameworks and Security Libraries 9: Include Security-Specific Requirements 10: Design and Architect Security In

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current03:05, 27 February 2016 (4.23 MB)Jmanico (talk | contribs)Version updated to reflect Proactive Controls 2.0
  • You cannot overwrite this file.

There are no pages that link to this file.