Skip to content

Latest commit

 

History

History
97 lines (54 loc) · 5.55 KB

secure-architecture-approaches.md

File metadata and controls

97 lines (54 loc) · 5.55 KB

Secure Architecture Methologies

Table of Contents

OWASP

owasp-guides

The "Top Ten", first published in 2003, is regularly updated.[10] It aims to raise awareness about application security by identifying some of the most critical risks facing organizations.[11][12][13] Many standards, books, tools, and many organizations reference the Top 10 project, including MITRE, PCI DSS,[14] the Defense Information Systems Agency (DISA-STIG), and the United States Federal Trade Commission (FTC),[15]

OWASP Software Assurance Maturity Model:

The Software Assurance Maturity Model (SAMM) project's mission is to provide an effective and measurable way for all types of organizations to analyze and improve their software security posture. A core objective is to raise awareness and educate organizations on how to design, develop, and deploy secure software through a flexible self-assessment model. SAMM supports the complete software lifecycle and is technology and process agnostic. The SAMM model is designed to be evolutive and risk-driven in nature, acknowledging there is no single recipe that works for all organizations.[16]

OWASP Development Guide:

The Development Guide provides practical guidance and includes J2EE, ASP.NET, and PHP code samples. The Development Guide covers an extensive array of application-level security issues, from SQL injection through modern concerns such as phishing, credit card handling, session fixation, cross-site request forgeries, compliance, and privacy issues.

OWASP Testing Guide:

The OWASP Testing Guide includes a "best practice" penetration testing framework that users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues. Version 4 was published in September 2014, with input from 60 individuals.[17]

The code review guide is currently at release version 2.0, released in July 2017.

OWASP Application Security Verification Standard (ASVS):

A standard for performing application-level security verifications.[18]

  • OWASP XML Security Gateway (XSG) Evaluation Criteria Project.[19]

OWASP Top 10 Incident Response Guidance.

This project provides a proactive approach to Incident Response planning. The intended audience of this document includes business owners to security engineers, developers, audit, program managers, law enforcement & legal council.[20]

OWASP ZAP Project:

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience including developers and functional testers who are new to penetration testing.

Webgoat:

a deliberately insecure web application created by OWASP as a guide for secure programming practices.[1] Once downloaded, the application comes with a tutorial and a set of different lessons that instruct students how to exploit vulnerabilities with the intention of teaching them how to write code securely.

The Application Security (AppSec) Rugged DevOps Pipeline Project is a place to find information needed to increase the speed and automation of an application security program. AppSec Pipelines take the principles of DevOps and Lean and applies that to an application security program.[21]

OWASP Automated Threats to Web Applications: Published July 2015[22]

the OWASP Automated Threats to Web Applications Project aims to provide definitive information and other resources for architects, developers, testers and others to help defend against automated threats such as credential stuffing. The project outlines the top 20 automated threats as defined by OWASP.[23]

focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs). Includes the most recent list API Security Top 10 2019.[24]

OWASP Amass

OWASP Cheat Sheet Series

OWASP CSRFGuard

OWASP CycloneDX

OWASP Defectdojo

OWASP Dependency-Check

OWASP Dependency-Track

OWASP Juice Shop

OWASP Mobile Application Security

OWASP ModSecurity Core Rule Set

OWASP OWTF

OWASP SAMM

OWASP Security Knowledge Framework

OWASP Security Shepherd

OWASP Web Security Testing Guide

Secure Architecture Methods

Secure Architecture Procedures

Secure Architecture Techniques

^ back to top ^

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.