Code Review Guide Book 2.0 2013 PROJECT SUMMIT. About Me Company Logo Hosted.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Past, Present and Future By Eoin Keary and Jim Manico
OWASP Secure Coding Practices Quick Reference Guide
Presenting the OWASP Testing Guide v4 ALPHA Andrew Muller, Matteo Meucci.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
OWASP WEBGOAT Alaa Darabseh Department of Computer Science
Automation Domination Application Security with Continuous Integration (CI)
A Demo of and Preventing XSS in.NET Applications.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Introduction to Web Application Security
SaaS, PaaS & TaaS By: Raza Usmani
Introduction to the OWASP Top 10. Cross Site Scripting (XSS)  Comes in several flavors:  Stored  Reflective  DOM-Based.
What is OWASP OWASP Live CD Live Demo Omar Sherin-OWASP Egypt.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Web Application Testing with AppScan Terry Labach.
10 Steps To Agile Development Without Compromising Enterprise Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
2013 AppSec Guide and CISO Survey: Making OWASP Visible to CISOs Marco Morana, Member of OWASP London, Project Lead of the OWASP, CISO Guide Tobias Gondrom,
OWASP Mobile Top 10 Why They Matter and What We Can Do
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
CSCI 6962: Server-side Design and Programming Course Introduction and Overview.
Socket based Client/Server Systems Exercises in. Exercises Build a generic client Build an echo server Build a http client and server Build a proxy/firewall.
A Security Review Process for Existing Software Applications
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Dudok de Wit David.  Documents management in a deskless company  SharePoint Online as a solution  Redesigning the documentary organization  Interoperability.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CSC 2720 Building Web Applications Basic Frameworks for Building Dynamic Web Sites / Web Applications.
Slide 1 Chapter 0 SQL Server 2005 Installation. Slide 2 Content 1.Prerequisite Installation 2.SQL server 2005 Express Installation 3.SQL Client Tools.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Ext JS - Direct Bridging The Gap A DMSBT Presentation By Timothy Chandler.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
WEB TESTING
Presented by Rob Carver
SQL Server Security & Intrusion Prevention
Manuel Brugnoli, Elisa Heymann UAB
Canberra OWASP Chapter meeting
API Security Auditing Be Aware,Be Safe
OWASP Testing Guide V3 Matteo Meucci OWASP Testing Guide Lead.
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
A Security Review Process for Existing Software Applications
Enterprise Library Overview
SQL Server 2005 Installation
Code-Less Securing of SQL Server
HTML Level II (CyberAdvantage)
Web Browser server client 3-Tier Architecture Apache web server PHP
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Eoin Keary Code review Lead Irish Chapter Lead
ASP.NET Module Subtitle.
IBM GTS Storage Security and Compliance overview.
Building Serverless Enterprise Applications
Building production-ready APIs with ASP.NET Core 2.2
Web Servers (IIS and Apache)
Presentation transcript:

Code Review Guide Book PROJECT SUMMIT

About Me Company Logo Hosted by OWASP & the NYC Chapter

Agenda The most important side in this deck… Why… The most important people…Contributors Leaders Current Focus…(We need you) Next Steps… The second most important slide in this deck… Hosted by OWASP & the NYC Chapter

e_review_V2_Project review_V2_Table_of_Contents

Why…Developer community needs Code Review Book. OWASP is serving that need. Hosted by OWASP & the NYC Chapter

Larry Conklin Johanna Curiel Eoin Keary Islam Azeddine Mennouchi Abbas Naderi Carlos Pantelides Ashish Rao Gary David Robinson Colin Watson Mghazli Zyad

Co-Leaders Eoin Keary Larry Conklin With a great amount of support from Samantha Groves Hosted by OWASP & the NYC Chapter

Where we are at… Pre-Alpha Release… Finishing content. Begin reviewing for spelling, grammar and technical accuracy. Afterwards our steps will be to have book reviewed by a professional editor, and review graphics with a professional graphics designer. Hosted by OWASP & the NYC Chapter

360 Reviews Code Review Approach Application Threat Modeling Code Layout Design Architecture SDLC Integration Secure Depending Configuration Metrics Code Review Source Sink Review Code Review Coverage Code Review Compliance Authentication Controls Authentication Out of Band Reducing Attack Surface File Resource Handling Hosted by OWASP & the NYC Chapter

Client Side Code Introduction, json, Content Security, Browser Defense Policies Input Validation Introduction, Regex Gotchas, ESAPI Resource Exhaustion Error Handling, Native Calls Logging Code Security Alerts Secure Storage Persistent AntiPattern Introduction, Ruby,PHP Reflected AntiPattern Introduction, Ruby Stored AntiPattern Introduction, PHP, Ruby Hosted by OWASP & the NYC Chapter

JQuery Mistakes Review Code SQL Injection (.Net, HQL(Hibernate) AntiPattern, PHP, Java,.Net,ColdFusion Transactional logic / Non idempotent functions / State Changing Functions Reviewing code for poor logic /Business logic/Complex authorization Secure Communications, HTTP Hdrs, HTTP Hdrs CSP,HTTP HSTS Tech Stack Pitfalls Framework Specific Issues… Hosted by OWASP & the NYC Chapter

Looking for volunteers to begin word smiting, checking for technical accuracy, adding content. Mailing lists… Hosted by OWASP & the NYC Chapter owasp-codereview owasp_code_review_guide_authors

Questions…. Hosted by OWASP & the NYC Chapter