This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP Application Security Guide For CISOs Project/Releases/Current"

From OWASP
Jump to: navigation, search
m
Line 10: Line 10:
 
This CISO guide is written to help CISOs that are responsible for managing application security programs from the information security and risk management perspectives. From the information security perspective, there is a need to protect the organization assets such as the citizen, client and customer sensitive data, the databases where this data is stored, the network infrastructure where the database servers reside and last but not least, the applications and software used to access and process this data. Besides business and user data, applications and software are among the assets that CISOs seek to protect. Some of these applications and software provide business critical functions to customers that generate revenues for the organization. Examples include applications and software that provide customers with business services as well as applications and software that are sold as products to the clients. In the case where software applications are considered business critical information assets, these should receive a specific focus in human resources, training, processes, standards and tools. The scope of this guide is the security of web applications and the security of the components of the architecture such as the security of web servers, application servers and databases. This does not include other aspects of security that are not related to the specific application. Such as the security of the network infrastructure that supports the applications and constitutes a valued asset whose security properties such as confidentiality, integrity and availability need to be protected as well
 
This CISO guide is written to help CISOs that are responsible for managing application security programs from the information security and risk management perspectives. From the information security perspective, there is a need to protect the organization assets such as the citizen, client and customer sensitive data, the databases where this data is stored, the network infrastructure where the database servers reside and last but not least, the applications and software used to access and process this data. Besides business and user data, applications and software are among the assets that CISOs seek to protect. Some of these applications and software provide business critical functions to customers that generate revenues for the organization. Examples include applications and software that provide customers with business services as well as applications and software that are sold as products to the clients. In the case where software applications are considered business critical information assets, these should receive a specific focus in human resources, training, processes, standards and tools. The scope of this guide is the security of web applications and the security of the components of the architecture such as the security of web servers, application servers and databases. This does not include other aspects of security that are not related to the specific application. Such as the security of the network infrastructure that supports the applications and constitutes a valued asset whose security properties such as confidentiality, integrity and availability need to be protected as well
 
| release_license = [http://www.apache.org/licenses/LICENSE-2.0 Apache License 2.0]
 
| release_license = [http://www.apache.org/licenses/LICENSE-2.0 Apache License 2.0]
| release_download_link = [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html
+
| release_download_link = [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-2128858]
OWASP Application security guide for CISOs]
 
 
| leader_name1 = Marco Morana
 
| leader_name1 = Marco Morana
 
| leader_email1 = [email protected]
 
| leader_email1 = [email protected]

Revision as of 22:26, 13 November 2013

back to project home page

what is this release?
OWASP Application security guide for CISOs - 11/19/2013 - [[1] (download)]
Release Description: first version

Among application security stakeholders, Chief Information Security Officers (CISOs) are responsible for application security from governance, compliance and risk perspectives. This guide seeks to help CISOs manage application security programs according to CISO roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout this guide. OWASP is a non profit organization whose mission is "making application security visible and empowering application security stakeholders with the right information for managing application security risks. This CISO guide is written to help CISOs that are responsible for managing application security programs from the information security and risk management perspectives. From the information security perspective, there is a need to protect the organization assets such as the citizen, client and customer sensitive data, the databases where this data is stored, the network infrastructure where the database servers reside and last but not least, the applications and software used to access and process this data. Besides business and user data, applications and software are among the assets that CISOs seek to protect. Some of these applications and software provide business critical functions to customers that generate revenues for the organization. Examples include applications and software that provide customers with business services as well as applications and software that are sold as products to the clients. In the case where software applications are considered business critical information assets, these should receive a specific focus in human resources, training, processes, standards and tools. The scope of this guide is the security of web applications and the security of the components of the architecture such as the security of web servers, application servers and databases. This does not include other aspects of security that are not related to the specific application. Such as the security of the network infrastructure that supports the applications and constitutes a valued asset whose security properties such as confidentiality, integrity and availability need to be protected as well

Release License: Apache License 2.0
who worked on this release?
Release Leader(s):
how can you learn more?
Release Notes: Not Yet Created
Release Rating: Projects/OWASP Application Security Guide for CISOs/GPC/Assessment/OWASP Application security guide for CISOs
Key Contacts
  • Contact the GPC to report a problem or concern about this release info or to update information.