This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10-2017 What's Next for Security Testers"
(Created page with "{{Top_10_2013:TopTemplate |usenext=2013NextLink |next={{Top_10:LanguageFile|text=noteAboutRisks|language=en}} |useprev=2013PrevLink |prev={{Top_10:LanguageFile...") |
|||
Line 36: | Line 36: | ||
{{Top_10_2013:BottomTemplate | {{Top_10_2013:BottomTemplate | ||
|usenext=2013NextLink | |usenext=2013NextLink | ||
− | |next={{Top_10:LanguageFile|text= | + | |next={{Top_10:LanguageFile|text=noteAboutRisks|language=en}} |
|useprev=2013PrevLink | |useprev=2013PrevLink | ||
− | |prev={{Top_10:LanguageFile|text= | + | |prev={{Top_10:LanguageFile|text=whatsNextforDevelopers|language=en}} |
|year=2017 | |year=2017 | ||
|language=en | |language=en | ||
}} | }} |
Revision as of 16:00, 22 April 2017
Establish Continuous Application Security Testing
Building code securely is important. But it’s critical to verify that the security you intended to build is actually present, correctly implemented, and used everywhere it was supposed to be. The goal of application security testing is to provide this evidence. The work is difficult and complex, and modern high-speed development processes like Agile and DevOps have put extreme pressure on traditional approaches and tools. So we strongly encourage you to put some thought into how you are going to focus on what’s important across your entire application portfolio, and do it cost-effectively. Modern risks move quickly, so the days of scanning or penetration testing an application for vulnerabilities once every year or so are long gone. Modern software development requires continuous application security testing across the entire software development lifecycle. Look to enhance existing development pipelines with security automation that doesn’t slow development. Whatever approach you choose, consider the annual cost to test, triage, remediate, retest, and redeploy a single application, multiplied by the size of your application portfolio.
Understand the Threat Model
Understand Your SDLC
Testing Strategies
Achieving Coverage and Accuracy
Make Findings Awesome
|