Proactively Building Secure Software w Josh Grossman, Bounce Security DevSec For Scale from Akeyless


Fortunately, image memorability, or how well they stick in your memory, is something that you can improve with practice and innovation. Pick your journey locations for immediate recall and clarity while traveling through them in your mind.

owasp top 10 proactive controls project

Tools provide automated methods to extend your program’s capabilities with a small investment in time. Why create your own set of requirements for web application security when such a robust framework exists for your use? If you must produce something of your own, use the ASVS as a baseline to build upon. The value of the Top Ten comes from the fact that risks are sorted using industry data, and high-level mitigations to fix these issues are presented.

Lecture 7 OWASP

This group includes ASVS, SAMM, threat modeling, Code Review guide, and the testing guide. The end-to-end world of the developer is explored, from requirements through writing code. The working portion includes using ASVS to assess a sample app, threat modeling a sample app, and using SAMM for owasp proactive controls a sample assessment. This group focuses on tools, including the testing guide, Dependency Check, Threat Dragon, CRS, and ZAP. The testing approach and touch points are discussed, as well as a high-level survey of the tools. The working portion includes using ZAP to scan a sample application.

owasp top 10 proactive controls project

Protection from SQL injections with techniques such as parameter binding. It is also of great importance to monitor for vulnerabilities in ORM and SQL libraries that you make use of as we’ve seen with the recent incident of Sequelize ORM npm library found vulnerable to SQL Injection attacks. The OWASP Top 10 Proactive Controls is similar to the OWASP Top 10 but is focused on defensive techniques and controls as opposed to risks. Each technique or control in this document will map to one or more items in the risk based OWASP Top 10. For example, while we primarily talked about Mobile and Web Application Security frameworks, every day more and more serverless code is being run, which means more and more attacks are bound to target serverless apps.

How to avoid identification and authentication vulnerabilities?

This requirement helps ensure we use threat modeling effectively and continuously throughout our SDLC. In addition to the maturity levels, the ASVS has categories, and those categories have requirements. Each requirement has a column for the 3 maturity levels, with a check mark if it is needed to attain that maturity.

Projects are broken down into awareness/process/tools, with an explanation of the human resources required to make this successful. This course is a one-day training where there is a mixture of a lecture on a specific segment of OWASP projects, and then a practical exercise for how to use that project as a component of an application security program. These projects focus on high-level knowledge, methodology, and training for the application security program. This group includes OWASP Top 10, OWASP Proactive Controls, cheat sheets, and training apps . Discussions focus on the process of raising awareness with knowledge/training and building out a program. The practical portion includes discussion of rolling out proactive controls and hands-on time with JuiceShop. These focus on requirements, code review, best practices, development libraries, and building software without known vulnerabilities.

Link to the OWASP Top 10 Project

In this case, OWASP lists the top 10 that we should consider for every software development project. The Code Review Guide provides you that checklist and also describes all the other things you must understand about code review for web applications, with example snippets of code and guidance on what to look for. Traditional application security programs include people, process, and tools.

  • The major cause of API and web application insecurity is insecure software development practices.
  • The method of loci takes a well-known area and identifies locations in that space to imprint information for later retrieval.
  • Experience a practitioner’s guide for how to take the most famous OWASP projects and meld them together into a working program.
  • In this special presentation for PHPNW, based on v2.0 released this year, you will learn how to incorporate security into your software projects.
  • This ebook shows best practices and prevention techniques for keeping vulnerabilities away and securing your web apps.

But developers have a lot on their plates and asking them to become familiar with every single vulnerability category under the sun isn’t always feasible. Even for security practitioners, it’s overwhelming to keep up with every new vulnerability, attack vector, technique, and mitigation bypass. Developers are already wielding new languages and libraries at the speed of DevOps, agility, and CI/CD. As you look at the list of requirements, you’ll quickly realize how lengthy of a document it is. Even if L2 is checked for a requirement, especially for some of the later categories and requirements, they may not all apply to your application and/or organization, and they may not be things you deem important to focus on.

In this episode, I talk to Josh Grossman, CTO at Bounce Security and OWASP Israel Board Member about the Top 10 Proactive Controls project by OWASP . Josh walks us through how to think about security risks as well as understand what controls need to be put in place to ensure your applications are secure from day one. Developers tend to lack knowledge of how to perform application-focused security testing. The Testing Guide explains how to test and provides a knowledge base on how to exploit web application vulnerabilities. The Testing Guide is an in-depth resource with examples that walk your developers through how various Top Ten issues play out. It is a collection of application security requirements, written in such a way as to be verifiable. ASVS defines four levels—cursory, opportunistic, standard, and advanced—and prescribes different depths of requirements based on your assessment for the criticality of a given application.

owasp top 10 proactive controls project


About Author

Leave A Reply