Deploying Secure Web Applications with OWASP Resources

  • Cerullo F
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secure applications do not just happen – they are the result of an organization decid-ing that they will produce secure applications. OWASP's does not wish to force a particular approach or require an organization to pick up compliance with laws that do not affect them as every organization is different. However, for a secure application, the following at a minimum are required: • Organizational management which champions security • Written information security policy properly derived from national standards • A development methodology with adequate security checkpoints and activities • Secure release and configuration management Many of the tools, documentation and controls developed by OWASP are influ-enced by requirements in international standards and control frameworks such as COBIT and ISO. Furthermore, OWASP resources can be used by any type of organization ranging from universities to financial institutions in order to develop, test and deploy secure web applications. This presentation will introduce you to some of the most successful projects such as: -OWASP Enterprise Security API which can be used to mitigate most com-mon flaws in web applications; -OWASP ASVS which is intended as a standard on how to verify the security of web applications; -OWASP Top 10 which helps to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses; -OWASP Development Guide which shows how to architect and build a se-cure application; -OWASP Code Review Guide which shows how to verify the security of an application; source code; OWASP Testing Guide which shows how to verify the security of your running application. Finally, as OWASP believes education is a key component in building secure ap-plications, some of the initiatives being carried out by the OWASP Global Education Committee are going to be highlighted.

Cite

CITATION STYLE

APA

Cerullo, F. E. (2010). Deploying Secure Web Applications with OWASP Resources (pp. 21–21). https://doi.org/10.1007/978-3-642-16120-9_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free