Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
OWASP Secure Coding Practices Quick Reference Guide
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 3.0 license The OWASP Foundation OWASP
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
What is OWASP OWASP Live CD Live Demo Omar Sherin-OWASP Egypt.
The OWASP Foundation Setting up a Secure Development Life Cycle with OWASP Seba Deleersnyder OWASP Foundation Board.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP BeNeLux 2010
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
OWASP Zed Attack Proxy Project Lead
A Framework for Automated Web Application Security Evaluation
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security testing of study information system Security team: Matis Alliksoo Alo Konno Urmo Lihten Taavi Podzuks Sander Saarm.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Meet OWASP: resources you can use, today. Antonio Fontes OWASP Geneva Chapter Leader Switzerland.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Top 10 from a developer’s perspective John Wilander, OWASP/Omegapoint, IBWAS’10.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Deconstructing API Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation OWASP Global Update Seba Deleersnyder OWASP Foundation Board Member.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ASVS Levels1234 Tools Manual Test and Review Manual Design Review At higher levels in ASVS,the use of tools is encouraged. But to be effective,the.
MIS Week 5 Site:
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OpenSAMM Best Practices, Lessons from the Trenches
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
^ About the.
OWASP in favor of a more secure world
Tour of OWASP’s projects
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP OWASP Limerick Chapter Introduction to OWASP Projects and Resources

OWASP 2 OWASP Projects and Resources  Make application security visible  video, podcasts, books, guidelines, security cheatsheets, software tools, etc  Focused on improving the security of application software.  Available under a free and open software license.  Used, recommended and referenced by many government, standards and industry organisations.  Open for everyone to participate.

OWASP 3 OWASP Projects and Resources Classification  PROTECT  guard against security-related design and implementation flaws.  DETECT  find security-related design and implementation flaws.  LIFE CYCLE  add security-related activities into software processes (eg. SDLC, agile, etc)

OWASP 4 OWASP Projects and Resources  OWASP Top 10  OWASP Testing Guide  OWASP WebScarab  OWASP WebGoat  OWASP ESAPI  OWASP Backend Security  OWASP Code Review Guide  OWASP CodeCrawler  OWASP SAMM  OWASP AppSensor  OWASP AntiSammy  OWASP ModSecurity Core Rule Set  OWASP Application Security Verification Standard  OWASP LiveCD / WTE  … Full list of projects (release, beta, alpha)

OWASP 5 Software Development Life Cycle (SDLC) – General Security Requirements Requirements definition Architecture and Design DevelopmentTestDeploymentMaintenance Application Security Requirements Application Security Design Threat Modelling Secure Coding Security Testing Security Code Review Penetration Testing Remediation Plan Secure Configuration Management Secure Deployment SDLC phases Security Requirements

OWASP 6 OWASP Top 10  Defines the most critical security vulnerabilities, how to find it, and what to do to protect your applications against it A1: Injection (SQL, LDAP, OS) A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards

OWASP 7 OWASP CLASP  Comprehensive, Lightweight Application Security Process (CLASP)  Address security concerns into the early stages of the software development processes  Defines process pieces that can be integrated into any software development process  Provides guidance on implementing a secure software development lifecycle

OWASP 8 OWASP Application Threat Modeling  An approach for analyzing the security of an application  Allows identifying, quantifying, and addressing the security risks associated with an application  Threat modeling process steps  Decompose the Application - use-cases, entry points, identify assets, and identify users’ access rights  Determine and rank threats - threat categorization methodologies such as STRIDE, Application Security Frame (ASF)  Determine countermeasures and mitigation - threat-countermeasure mapping lists

OWASP 9 OWASP Secure Coding Practices  A technology agnostic set of general software security coding practices (checklist) that can be integrated into development processes.  The focus is on secure coding requirements  to serve as a secure coding kick-start tool and easy reference  to help development teams quickly understand secure coding practices  Implementation of these practices mitigates most common software vulnerabilities.

OWASP 10 OWASP WebGoat  Deliberately insecure J2EE web application to teach web application security lessons  30 lessons, providing hands-on learning about  Cross-Site Scripting (XSS)  Access Control  Thread Safety  Hidden Form Field Manipulation  Parameter Manipulation  Weak Session Cookies  Blind/Numeric/String SQL Injection  Web Services  Fail Open Authentication  … and many more

OWASP 11 OWASP Enterprise Security API (ESAPI)  Free and open collection of security methods for building secure Web applications  Languages/ Technologies  JAVA  PHP .NET  ASP  ColdFusion  Python  JavaScript  Haskell  Force.com

OWASP 12 OWASP Backend Security  Guide for developers, administrators and testers.  Security aspects of backend components that directly communicate with the web applications, as well as databases, LDAPs, payment gateway.  Covers backend  security development  security hardening  and security testing

OWASP 13 OWASP Application Security Verification Standard  OWASP ASVS - standard for conducting application security assessments.  Covers automated and manual approaches for verifying applications using both security testing and code review techniques.  Can be used to establish a level of confidence in the security of Web applications  Metric - assess the degree of trust that can be placed in their Web applications  Guidance - provide guidance to security control developers as to what to build into security controls to satisfy security requirements  Use during procurement - provide a basis for specifying application security verification requirements in contracts

OWASP 14 OWASP Testing Guide  Focused on application security testing procedures and checklists.  Includes a "best practice" penetration testing framework.  “Low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.

OWASP 15 OWASP Code Review Guide  Manual security code review provides insight into the “real risk” associated with insecure code.  Code Review is the single-most effective technique for identifying security flaws.  Best practices for reviewing code for security defects.  Focuses on reviewing code for certain vulnerabilities.

OWASP 16 OWASP LiveCD/Web Testing Environment (WTE)  A collection of some of the best open source security tools for testing web applications:  OWASP WebScarab  OWASP WebGoat  OWASP JBroFuzz  Paros Proxy  nmap & Zenmap  Wireshark  Burp Suite  Grenedel-Scan  Rat Proxy  … 

OWASP 17 OWASP ModSecurity Core Rule Set  The Core Rule Set (CRS) provides critical protections against attacks across most every web architecture.  CRS is based on generic rules which focus on attack payload identification  Provides protection from zero day and unknown vulnerabilities often found in web applications.  Related project: Securing WebGoat using ModSecurity

OWASP 18 Questions?