This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Java Project Roadmap"

From OWASP
Jump to: navigation, search
m (Current Tasks)
Line 16: Line 16:
 
==Current Tasks==
 
==Current Tasks==
 
* Decide on the near term tactical goals
 
* Decide on the near term tactical goals
* Define this roadmap
+
* Define this roadmap.  This is currently being discussed here: http://www.owasp.org/index.php/Talk:OWASP_Java_Project_Roadmap#J2EE_Security_for_Architects
 
 
  
 
==Ideas==
 
==Ideas==

Revision as of 13:14, 12 June 2006

Goals

The OWASP Java Project's overall goal is to...

Produce materials that show J2EE architects, developers, and
deployers how to deal with most common application security
problems throughout the lifecycle.

In the near term, we are focused on the following tactical goals:

  1. Provide examples of how to prevent Cross Site Scripting attacks in popular web frameworks
  2. Provide examples of how to prevent SQL Injection in popular data access frameworks
  3. Provide examples of how to prevent LDAP injection in Java
  4. A practical guide to implementing a security policy for a Java web application
  5. Secure configuration guides for popular application servers

Current Tasks

Ideas

Please submit your ideas for the OWASP Java Project here (you can sign your ideas by adding four tilde characters like this ~~~~)

  • It would be useful to have a library of J2EE security resources on the web. In addition to URLs, I think these should have short summaries that explain what the resource is about. I've clicked on far too many "J2EE Security" links only to find that the article is about implementing access control in Tomcat.
  • A tool that automatically generates a security policy for a given application could be useful. The tool is first run in learning mode where it maps all the accesses that the application attempts and then generates a policy based on those access attempts.
    • Note: I built such a tool back in the mid-1990's. It's a custom security manager that intercepts all accesses and has a "learn" mode. If someone is willing to take on the project, I'd be happy to dig it up. Jeff Williams 16:18, 8 June 2006 (EDT)