This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Proactive Controls 2016"

From OWASP
Jump to: navigation, search
(Created page with "= Archive - OWASP Top 10 Proactive Controls 2016 = {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | valign="top" style="border-right: 1px dotted gray;pad...")
 
Line 1: Line 1:
= Archive - OWASP Top 10 Proactive Controls 2016 =
 
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
Line 6: Line 5:
 
== OWASP Top 10 Proactive Controls 2016 ==
 
== OWASP Top 10 Proactive Controls 2016 ==
  
 +
The OWASP Top Ten Proactive Controls 2016 is a list of security concepts that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important.
 +
 +
# [[OWASP Proactive Controls#1:_Verify_for_Security_Early_and_Often | Verify for Security Early and Often]]
 +
# [[OWASP Proactive Controls#2:_Parameterize_Queries | Parameterize Queries]]
 +
# [[OWASP Proactive Controls#3:_Encode_Data |  Encode Data]]
 +
# [[OWASP Proactive Controls#4:_Validate_All_Inputs|  Validate All Inputs]]
 +
# [[OWASP Proactive Controls#5:_Implement_Identity_and_Authentication_Controls | Implement Identity and Authentication Controls]]
 +
# [[OWASP Proactive Controls#6:_Implement_Access_Controls | Implement Appropriate Access Controls]]
 +
# [[OWASP Proactive Controls#7:_Protect_Data| Protect Data]]
 +
# [[OWASP Proactive Controls#8:_Implement_Logging_and_Intrusion_Detection | Implement Logging and Intrusion Detection]]
 +
# [[OWASP Proactive Controls#9:_Leverage_Security_Frameworks_and_Libraries | Leverage Security Frameworks and Libraries]]
 +
# [[OWASP Proactive Controls#10:_Error_and_Exception_Handling | Error and Exception Handling]]
 +
 +
<br />
 +
== 1: Verify for Security Early and Often ==
  
 
| valign="top" style="padding-left:25px;width:200px;" |
 
| valign="top" style="padding-left:25px;width:200px;" |
Line 16: Line 30:
 
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/3/33/OWASP_Top_Ten_Proactive_Controls_v2.pptx PPT download].
 
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/3/33/OWASP_Top_Ten_Proactive_Controls_v2.pptx PPT download].
 
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/8/8b/OWASP_Top_10_Proactive_Controls_-_V2.0.docx DOCX download].
 
* Top 10 Proactive Controls 2016 [{{SERVER}}/images/8/8b/OWASP_Top_10_Proactive_Controls_-_V2.0.docx DOCX download].
* Top 10 Mapping 2016
+
 
 +
 
 +
== Mapping  ==
 +
* OWASP Top 10 [{{SERVER}}/index.php/OWASP_Proactive_Controls_2016-Top10_Mapping/ Mapping 2016]
  
 
== Translations ==
 
== Translations ==

Revision as of 12:36, 7 May 2018

OWASP Top 10 Proactive Controls 2016

The OWASP Top Ten Proactive Controls 2016 is a list of security concepts that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important.

  1. Verify for Security Early and Often
  2. Parameterize Queries
  3. Encode Data
  4. Validate All Inputs
  5. Implement Identity and Authentication Controls
  6. Implement Appropriate Access Controls
  7. Protect Data
  8. Implement Logging and Intrusion Detection
  9. Leverage Security Frameworks and Libraries
  10. Error and Exception Handling


1: Verify for Security Early and Often


Quick Access


Mapping

Translations