This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Proactive Controls 2016"
From OWASP
(Created page with "= Archive - OWASP Top 10 Proactive Controls 2016 = {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | valign="top" style="border-right: 1px dotted gray;pad...") |
|||
Line 1: | Line 1: | ||
− | |||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
Line 6: | Line 5: | ||
== OWASP Top 10 Proactive Controls 2016 == | == OWASP Top 10 Proactive Controls 2016 == | ||
+ | The OWASP Top Ten Proactive Controls 2016 is a list of security concepts that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. | ||
+ | |||
+ | # [[OWASP Proactive Controls#1:_Verify_for_Security_Early_and_Often | Verify for Security Early and Often]] | ||
+ | # [[OWASP Proactive Controls#2:_Parameterize_Queries | Parameterize Queries]] | ||
+ | # [[OWASP Proactive Controls#3:_Encode_Data | Encode Data]] | ||
+ | # [[OWASP Proactive Controls#4:_Validate_All_Inputs| Validate All Inputs]] | ||
+ | # [[OWASP Proactive Controls#5:_Implement_Identity_and_Authentication_Controls | Implement Identity and Authentication Controls]] | ||
+ | # [[OWASP Proactive Controls#6:_Implement_Access_Controls | Implement Appropriate Access Controls]] | ||
+ | # [[OWASP Proactive Controls#7:_Protect_Data| Protect Data]] | ||
+ | # [[OWASP Proactive Controls#8:_Implement_Logging_and_Intrusion_Detection | Implement Logging and Intrusion Detection]] | ||
+ | # [[OWASP Proactive Controls#9:_Leverage_Security_Frameworks_and_Libraries | Leverage Security Frameworks and Libraries]] | ||
+ | # [[OWASP Proactive Controls#10:_Error_and_Exception_Handling | Error and Exception Handling]] | ||
+ | |||
+ | <br /> | ||
+ | == 1: Verify for Security Early and Often == | ||
| valign="top" style="padding-left:25px;width:200px;" | | | valign="top" style="padding-left:25px;width:200px;" | | ||
Line 16: | Line 30: | ||
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/3/33/OWASP_Top_Ten_Proactive_Controls_v2.pptx PPT download]. | * Top 10 Proactive Controls 2016 [{{SERVER}}/images/3/33/OWASP_Top_Ten_Proactive_Controls_v2.pptx PPT download]. | ||
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/8/8b/OWASP_Top_10_Proactive_Controls_-_V2.0.docx DOCX download]. | * Top 10 Proactive Controls 2016 [{{SERVER}}/images/8/8b/OWASP_Top_10_Proactive_Controls_-_V2.0.docx DOCX download]. | ||
− | * Top 10 Mapping 2016 | + | |
+ | |||
+ | == Mapping == | ||
+ | * OWASP Top 10 [{{SERVER}}/index.php/OWASP_Proactive_Controls_2016-Top10_Mapping/ Mapping 2016] | ||
== Translations == | == Translations == |
Revision as of 12:36, 7 May 2018
OWASP Top 10 Proactive Controls 2016The OWASP Top Ten Proactive Controls 2016 is a list of security concepts that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important.
1: Verify for Security Early and Often |
Quick Access
Mapping
Translations |