Skip to content

Commit e5bceb0

Browse files
committed
branch away the top 10 2024
1 parent d35cc10 commit e5bceb0

18 files changed

+1234
-2
lines changed

docs/archive/2024/final-word.md

+10
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
# Final word
2+
3+
This document should be seen as a starting point rather than a comprehensive set of techniques and practices. We want to again emphasize that this document is intended to provide initial awareness around building secure software.
4+
5+
Good next steps to help build an application security program include:
6+
7+
1. To understand some of the risks in web application security please review the [OWASP Top Ten](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project) .
8+
2. A secure development program should include a *comprehensive list of security requirements* .
9+
Use [Threat Modeling](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html) to identify potential security threats, derive security requirements, and tailor security controls to prevent those. Use standards such as the [OWASP (Web) ASVS](https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project) and the [OWASP (Mobile) MASVS](https://github.com/OWASP/owasp-masvs) which provides a catalog of available security requirements along with the relevant verification criteria.
10+
3. To understand the core building blocks of a secure software program from a more macro point of view please review the [OWASP OpenSAMM project](https://www.owasp.org/index.php/OWASP_SAMM_Project).

docs/archive/2024/index.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# About this Project
2+
3+
Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure worldwide. As our digital, global infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially. We can no longer afford to tolerate relatively simple security problems.
4+
5+
## Aim & Objective
6+
7+
The goal of the **OWASP Top 10 Proactive Controls project** is to raise awareness about application security by describing the most important areas of concern that software developers must be aware of. We encourage you to use the OWASP Proactive Controls to get your developers started with application security. Developers can learn from the mistakes of other organizations. We hope that the OWASP Proactive Controls is useful to your efforts in building secure software.
8+
9+
## Target Audience
10+
11+
This document is primarily written for developers. However, development managers, product owners, Q/A professionals, program managers, and anyone involved in building software can also benefit from this document.
12+
13+
## How to Use this Document
14+
15+
This document’s main purpose is to provide a solid foundation of topics to help drive introductory software security developer training. To be effective, these controls should be used consistently and thoroughly throughout all applications.
16+
17+
However, this document is a starting point rather than a comprehensive set of techniques and practices.
18+
19+
A fully secure development process should include comprehensive requirements from a standard such as the OWASP ASVS in addition to including a range of software development activities described in maturity models such as [OWASP SAMM](https://www.owasp.org/index.php/OWASP_SAMM_Project) and [BSIMM](https://www.bsimm.com/).
20+
21+
## Project Leaders
22+
23+
* [Andreas Happe](mailto:[email protected]), connect through [linkedin](https://www.linkedin.com/in/andreashappe/), [github](https://github.com/andreashappe), [twitter/x](https://twitter.com/andreashappe)
24+
* [Jim Manico](mailto:[email protected]), connect through [linkedin](https://www.linkedin.com/in/jmanico/), [github](https://github.com/jmanico), [twitter/x](https://twitter.com/manicode)
25+
* [Katy Anton](mailto:[email protected]), connect through [linkedin](https://www.linkedin.com/in/katyanton/), [github](https://github.com/katyanton), [twitter/x](https://twitter.com/katyanton)
26+
27+
## Copyright and Licence
28+
29+
This document is released under the Creative Commons Attribution-ShareAlike 4.0 International license. For any reuse or distribution, you must make it clear to others the license terms of this work.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
# About OWASP
2+
3+
The *Open Worldwide Application Security Project* (*OWASP*) is an open community
4+
dedicated to enabling organizations to develop, purchase, and maintain
5+
applications and APIs that can be trusted.
6+
7+
All OWASP tools, documents, videos, presentations, and chapters are free and
8+
open to anyone interested in improving application security.
9+
10+
We advocate approaching application security as a people, process, and
11+
technology problem, because the most effective approaches to application
12+
security require improvements in these areas.
13+
14+
OWASP is a new kind of organization. Our freedom from commercial pressures
15+
allows us to provide unbiased, practical, and cost-effective information about
16+
application security.
17+
18+
OWASP is not affiliated with any technology company, although we support the
19+
informed use of commercial security technology. OWASP produces many types of
20+
materials in a collaborative, transparent, and open way.
21+
22+
The OWASP Foundation is the non-profit entity that ensures the project's
23+
long-term success. Almost everyone associated with OWASP is a volunteer,
24+
including the OWASP board, chapter leaders, project leaders, and project
25+
members. We support innovative security research with grants and infrastructure.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
# How to Contribute?
2+
3+
Please don’t hesitate to contact the OWASP Proactive Control project with your questions, comments, and ideas.
4+
5+
You can contact maintainers directly, use our [project-top10-proactive-controls OWASP slack channel](https://owasp.slack.com/archives/C07KNHZAN1H) (If you do not have a slack user, you can get a [free invite here](https://owasp.org/slack/invite)), or visit [our github page](https://github.com/OWASP/www-project-proactive-controls).
6+
7+
You find the source code of the current version of the OWASP Top 10 Proactive Controls in the `docs/` directory within the git repository. Please focus upon contributions for the current version, not archived versions within `docs/archive`.
8+
9+
When you check [our open issues on github](https://github.com/OWASP/www-project-proactive-controls/issues), you can see that some issues are tagged with `help wanted` or `good first issue`. Choose these if you want to help out the project!
10+
11+
## Translations
12+
13+
Starting with version `v4` in 2024, we don't accept inclusion of translations into the OWASP Top 10 Proactive Controls directly and are only providing the English version.
14+
15+
We do encourage translators to create translated versions and host them themselves and will link to those external sites/documents if notified about them.
16+
17+
## How to test the OWASP Proactive Control website locally?
18+
19+
If you can run python, you can locally run the OWASP Proactive Control website locally. We recommend this to test your changes before pushing them to github.
20+
21+
To do this, we will use `venv` to create a local python environment to install the needed `mkdocs` package.
22+
23+
```shell
24+
# creates and activates a new python environment in a new `venv` directory
25+
$ python3 -m venv venv
26+
$ source venv/bin/activate
27+
28+
# install the mkdocs package
29+
$ pip install mkdocs-material mkdocs-redirects
30+
31+
# switch into your checked-out OWASP Proactive Controls directory
32+
$ cd owasp-proactive-controls
33+
34+
# run the local webserver
35+
$ mkdocs serve
36+
37+
# now you can point your browser to http://localhost:8000 and check
38+
# how your changes will look like
39+
```
40+
41+
## A Big Thank you to our Contributors!
42+
43+
This document would not have been possible without our contributors for which we are grateful. The 2024 Version makes listing all contributors hard as we were using an untracked google shared doc in the beginning. We hope that we haven't missed someone and are very gracious for:
44+
45+
[Andreas Happe](https://github.com/andreashappe), [Jim Manico](https://github.com/jmanico), [Katy Anton](https://github.com/katyanton), Chris Romeo, Jasmin Mair, Abdessamad Temmar, Carl Sampson, Eyal Estrin, [Israel Chorzevski](https://github.com/sro-co-il), [Zoe Braiterman](https://github.com/zbraiterman), [Timo Pagel](https://github.com/wurstbrot), [ThreeHoolagins](https://github.com/ThreeHoolagins), [Wallace Soares](https://github.com/soareswallace), [Aref Shaheed](https://github.com/aref2008), [ThunderSon](https://github.com/ThunderSon), [Marcus Fenstrom](https://github.com/MFernstrom), [Datz](https://github.com/DatzAtWork), [Josh Grossman](https://github.com/tghosth), [Tomas Coiro](https://github.com/CoiroTomas), [Dr. Pi3ch](https://github.com/pi3ch), [Ishaq Mohammed](https://github.com/security-prince), [Richard Tweed](https://github.com/RichardoC), [Derek Gary](https://github.com/DerekGary), [Starr Brown](https://github.com/mamicidal), [Thomas](https://github.com/tthn0), [Christian Capellan](https://github.com/ccapellan), [Adriaan Joubert](https://github.com/adriaanjoubert), [Kenneth Kron](https://github.com/biofool), [Jaskirat Singh](https://github.com/Jassi2004), [Lukas Weichselbaum](https://github.com/lweichselbaum), [joonakokkola](https://github.com/joonakokkola), [cowsecurity](https://github.com/cowsecurity)
46+
47+
### Contributors to previous Top 10 Proactive Control versions
48+
49+
Another round of applause to all the contributors of previous OWASP Top 10 Proactive Controls lists:
50+
51+
Massimiliano Graziani, [Taras Ivashchenko](mailto:[email protected]), Jay Zudilin, [Danny Harris](mailto:[email protected]), Hiroaki Kuramochi, Hiroshi Fujimoto, Hidenori Nagai, [Riotaro OKADA](mailto:[email protected]), Robert Dracea, Koichiro Watanabe, Tony Hsu Hsiang Chih, [Cyrille Grandval](mailto:[email protected]), [Frédéric Baillon](mailto:[email protected]), [Danny Harris](mailto:[email protected]), Stephen de Vries, Andrew Van Der Stock, Gaz Heyes, Colin Watson, Jason Coleman, Cassio Goldschmidt, Dan Anderson, David Cybuck, Dave Ferguson, Osama Elnaggar, Rick Mitchell
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
# OWASP Top 10 Proactive Controls in the News
2+
3+
## 2024
4+
5+
Introduction of the OWASP Top 10 Proactive Controls v4 and switch to new wiki system.
6+
7+
- \[9 Sep 2024\] Featured in `SecureIdeas` post [What’s new in the OWASP Proactive Controls for 2024](https://www.secureideas.com/blog/whats-new-in-the-owasp-proactive-controls-for-2024)
8+
- \[6 Feb 2024\] Featured in `gbhackers.` post [OWASP Top 10 Proactive Security Controls For Software Developers to Build Secure Software](https://gbhackers.com/owasp-released-top-10-proactive-controls/)
9+
10+
## 2022
11+
12+
- \[10 Nov 2022\] [Blog Post by Kerr](https://kerr.ventures/2022/11/10/owasp-proactive-controls-the-answer-to-the-owasp-top-ten/)
13+
- \[13 June 2022\] Featured on the [GitHub Blog](https://github.blog/open-source/write-more-secure-code-owasp-top-10-proactive-controls/)
14+
15+
## 2021
16+
17+
- \[12 Feb 2021\] Featured in oneconsult's post [OWASP Top 10 Proactive Controls – Teil 1](https://www.oneconsult.com/de/blog/news/owasp-top-10-proactive-controls-teil-1/)
18+
19+
## 2020
20+
21+
- \[5 Nov 2020\] Featured by Snyk in [Developing secure software: how to implement the OWASP top 10 Proactive Controls](https://snyk.io/blog/owasp-top-10-proactive-controls-2020/)
22+
23+
## 2019
24+
25+
- \[July 2019\] Featured in Coursera course from UCDavies
26+
[Identifying Security Vulnerabilities](https://www.coursera.org/directory/videos?courseId=V1k0pBtIEemZRAqH7m9oGA)
27+
- \[23 June 2019\] Featured on HackerCombat: [Implement OWASP Proactive Controls to Work](https://hackercombat.com/implement-owasp-proactive-controls-to-work/)
28+
- \[7 June 2019\] Feature on OWASP DevSlop Show [Proactive Controls](https://www.youtube.com/watch?v=Jdb3qweDc_Q)
29+
- \[15 May 2019\] Featured in TechBeacon: [Put OWASP Top 10 Proactive Controls to work](https://techbeacon.com/security/put-owasp-top-10-proactive-controls-work)
30+
- \[2 Mar 2019\] Webinar: [The OWASP Top Ten Proactive Controls with Jim Manico](https://www.youtube.com/watch?v=ldXe8f5yVq8)
31+
32+
## 2018
33+
34+
The OWASP Top 10 Proactive Controls 2018 (v3) were released.
35+
36+
- \[Dec 2018\] Featured as the resource for Security “Shifting to the Left”\! in the ISC2 course: "DevSecOps: Integrating Security into DevOps”
37+
- \[20 Sep 2018\] Featured in TechBeacon: [OWASP Top 10 Proactive Controls 2018: How it makes your code more secure](https://techbeacon.com/owasp-top-10-proactive-controls-2018-how-it-makes-your-code-more-secure)
38+
- \[17 Sep 2018\] Binary Blogger Podcast Episodes: [OWASP Top 10 Proactive Controls Podcast Episodes](https://binaryblogger.com/2018/09/17/owasp-top-10-proactive-controls-podcast-episodes/)
39+
- \[9 May 2018\] Featured in [Developer's security guide: 50 online resources to shift left](https://techbeacon.com/developer-secure-code-starter-kit-resources)
40+
- \[7 May 2018\] 3.0 released\!
41+
42+
## 2017
43+
44+
- \[11 Aug 2017\] Presented at [Northeast PHP Conference](https://northeastphp2017.sched.com/event/B6uo/owasp-top-10-proactive-controls-2016)
45+
- \[25 July 2017\] Podcast about at [OWASP Top 10 Proactive Controls](https://www.appsecpodcast.org/2017/07/25/the-owasp-top-10-proactive-controls/)
46+
- \[12 May 2017\] Presented at [AppSec EU'17 - Belfast](https://appseceurope2017.sched.com/event/A652/the-path-of-secure-software)
47+
- \[14 Feb 2017\] Featured in [Managing Cloud Infrastructure to Prevent Security Gaps](http://wwpi.com/2017/02/14/managing-cloud-infrastructure-to-prevent-security-gaps/)
48+
- \[Feb 2017 \] Featured in "[Application Security Program: Protect Against Data Breaches](http://assets.unisys.com/Documents/Global/POVPapers/POV_170062_ApplicationSecurityProgramProtectAgainstDataBreaches.pdf)"
49+
50+
## 2016
51+
52+
The OWASP Top 10 Proactive Controls 2016 (v2) were released on Jan 14, 2016.
53+
54+
- \[1 Oct 2016\] Presented at [PHPNW16](http://conference.phpnw.org.uk/phpnw16/speakers/katy-anton/)
55+
- \[5 July 2016\] Featured in [Incorporating Security Best Practices into Agile Teams](https://www.thoughtworks.com/insights/blog/incorporating-security-best-practices-agile-teams)
56+
- \[June 2016 \] Featured in [A Transformative Approach to Secure Systems Delivery](http://www.booz-allen.co.in/content/dam/boozallen/documents/Viewpoints/2016/06/transformative-approach-to-secure-systems-delivery.pdf)
57+
- \[2 June 2016\] Featured in [DevOpsSec - Securing Software through Continuous Delivery](http://www.oreilly.com/webops-perf/free/devopssec.csp)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
# Related OWASP Projects
2+
3+
OWASP is a volunteer-driven organization. Those volunteers contributed many useful documents, and this section points to some related OWASP documents and projects:
4+
5+
## OWASP Top 10
6+
7+
The best-known OWASP document is the [OWASP Top 10](https://owasp.org/Top10/). They detail the most common web application vulnerabilities and are also the base for this document. In contrast, this document is focused on defensive techniques and controls as opposed to risks. Each control in this document will map to one or more items in the risk-based OWASP Top 10. This mapping information is included at the end of each control description.
8+
9+
## OWASP ASVS
10+
11+
[The OWASP Application Security Verification Standard (ASVS)](https://owasp.org/www-project-application-security-verification-standard/) is a catalog of available security requirements and verification criteria. OWASP ASVS can be a source of detailed security requirements for development teams. Security requirements are categorized into different buckets based on a shared higher order security function. For example, the ASVS contains categories such as authentication, access control, error handling / logging, and web services. Each category contains a collection of requirements that represent the best practices for that category drafted as verifiable statements.
12+
13+
## OWASP SAMM
14+
15+
[Software Assurance Maturity Model (SAMM)](https://www.opensamm.org/) is an open framework to help organizations implement a strategy for maturing the software security tailored to the specific risks of the organization. . [SAMM](https://owaspsamm.org/about/) supports the complete software life cycle and can be used to identify what
16+
17+
## Threat Modeling in General
18+
19+
Threat Modeling is an important part of secure application development, which can help identify potential security threats, derive security requirements, and tailor security controls to prevent potential threats. Successful use of security requirements involves four steps: discovery, documentation, implementation, and verification of the correct implementation of the functionality within an application. Threat modelling is one way to derive security requirements. Other sources are: industry standards, applicable laws, history of past vulnerabilities. Modeling tools, like [OWASP Threat Dragon](https://owasp.org/www-project-threat-dragon/) can be used to create threat model diagrams as part of a secure development life cycle.
20+
21+
## Domain-Specific Documents
22+
23+
It is important to notice that this document primarily focuses on web applications, but other Top 10s could apply to your application, too. Examples of those are:
24+
25+
- OWASP API Top 10
26+
- OWASP Mobile Application Top 10

0 commit comments

Comments
 (0)