This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:OWASP Top Ten Proactive Controls v2.pptx"

From OWASP
Jump to: navigation, search
(Jmanico uploaded a new version of "File:OWASP Top Ten Proactive Controls v2.pptx")
 
Line 1: Line 1:
 
The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development.
 
The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development.
1: Parameterize Queries
 
2: Encode Data
 
3: Validate All Inputs
 
4: Implement Appropriate Access Controls
 
5: Establish Identity and Authentication Controls
 
6: Protect Data and Privacy
 
7: Implement Logging, Error Handling and Intrusion Detection
 
8: Leverage Security Features of Frameworks and Security Libraries
 
9: Include Security-Specific Requirements
 
10: Design and Architect Security In
 

Latest revision as of 03:06, 27 February 2016

The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current03:05, 27 February 2016 (4.23 MB)Jmanico (talk | contribs)Version updated to reflect Proactive Controls 2.0
  • You cannot overwrite this file.

There are no pages that link to this file.