TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Understanding the OWASP list

148 点作者 flywithdolp超过 5 年前

6 条评论

jpalomaki超过 5 年前
I think most should be actually checking the &quot;OWASP Application Security Verification Standard Project&quot; [1] instead of just the Top 10 list.<p>The application security verification standard has quite clear requirements that you can just feed into your software development process. The requirements are split to three different levels, L1, L2 and L3. L1 requirements are more or less straightforward, standard application development stuff. L2 and L3 go more into processes. The idea is also that the L1 requirements can be verified by external penetration testing, without access to source code.<p>I would say the L1 requirements are something everybody involved in creating web apps professionally should check. Maybe some the requirements don&#x27;t make sense for your particular application, but for those cases it is a good exercise to write down why not.<p>[1] <a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Category:OWASP_Application_Security_Verification_Standard_Project" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Category:OWASP_Application_S...</a> (the document can be downloaded from the links on the right side)
评论 #21240139 未加载
评论 #21243849 未加载
rtempaccount1超过 5 年前
The OWASP Top 10 is intended as an awareness tool to help raise visibility of web app. security issues.<p>I&#x27;d agree with the article that it gets misused (a lot) as some kind of checklist that, if you apply, you can have a &quot;secure&quot; application.<p>Ironically OWASP has several other great projects that are designed to provide methodologies to improve application security like ASVS <a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Category:OWASP_Application_Security_Verification_Standard_Project" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Category:OWASP_Application_S...</a> and at a more organizational level, OWASP SAMM <a href="https:&#x2F;&#x2F;owaspsamm.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;owaspsamm.org&#x2F;</a> .<p>Where I do feel some frustration with this article is where , to me, it feels like it&#x27;s suggesting that &quot;shift left security&quot; (the idea that security activities should take place earlier in the development lifecycle) is any any way a new concept.<p>The idea of doing more application security work early in the development process has been around at least 20 years and probably more.<p>Instead of having new buzzwords for it, to try and make it more attractive, I&#x27;d be much more interested in a study of <i>why</i> after all this time it&#x27;s still not uncommon to see a first security touchpoint for a project be a penetration test done 2 weeks before go-live.
评论 #21239789 未加载
评论 #21239834 未加载
评论 #21239614 未加载
fulafel超过 5 年前
There are multiple lists, some for purpouses other than web app implementation. Some examples:<p><a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Cloud-Native_Application_Security_Top_10" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Cloud-Native_Applicati...</a><p><a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Mobile_Top_10" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Mobile_Top_10</a><p><a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Proactive_Controls" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;OWASP_Proactive_Controls</a>
petra超过 5 年前
The lift scala framework offers protection against many of the OWASP vulns automatically:<p><a href="https:&#x2F;&#x2F;seventhings.liftweb.net&#x2F;security" rel="nofollow">https:&#x2F;&#x2F;seventhings.liftweb.net&#x2F;security</a><p>Can this be improved to include support for all the OWASP ?if not, why ?
kingofpee超过 5 年前
Never heard of OWASP before<p>Do programmers really follow it? Is it a status quo for companies to make sure their software follow OWASP top 10 like a checklist?
评论 #21239687 未加载
评论 #21239668 未加载
评论 #21240494 未加载
评论 #21239652 未加载
unixhero超过 5 年前
Yup. And add MITRE ATT&amp;CK to that list