This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:OWASP Top Ten Proactive Controls v2.pptx

From OWASP
Revision as of 03:05, 27 February 2016 by Jmanico (talk | contribs) (Jmanico uploaded a new version of "File:OWASP Top Ten Proactive Controls v2.pptx")

Jump to: navigation, search
OWASP_Top_Ten_Proactive_Controls_v2.pptx(file size: 4.23 MB, MIME type: application/vnd.openxmlformats-officedocument.presentationml.presentation)
Warning: This file type may contain malicious code. By executing it, your system may be compromised.

The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This document was written by developers for developers to assist those new to secure development. 1: Parameterize Queries 2: Encode Data 3: Validate All Inputs 4: Implement Appropriate Access Controls 5: Establish Identity and Authentication Controls 6: Protect Data and Privacy 7: Implement Logging, Error Handling and Intrusion Detection 8: Leverage Security Features of Frameworks and Security Libraries 9: Include Security-Specific Requirements 10: Design and Architect Security In

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current03:05, 27 February 2016 (4.23 MB)Jmanico (talk | contribs)Version updated to reflect Proactive Controls 2.0
  • You cannot overwrite this file.

There are no pages that link to this file.