File tree Expand file tree Collapse file tree 15 files changed +169
-1
lines changed
04-vulnerability-management
09-training-education/01-vulnerable-apps
10-culture-process/02-security-champions
13-security-gap-analysis/01-guides Expand file tree Collapse file tree 15 files changed +169
-1
lines changed Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/design/threat_modeling/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 4.1 Threat modeling
1628
1729Referring to the [ Threat Modeling Cheat Sheet] [ tmcs ] ,
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/design/web_app_checklist/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 4.2 Web application checklist
1628
1729Checklists are a valuable resource for development teams.
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/implementation/documentation/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 5.1 Documentation
1628
1729Documentation is used here as part of the SAMM [ Training and Awareness] [ sammgegta ] activity,
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/implementation/dependencies/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 5.2 Dependencies
1628
1729Management of software dependencies is described by the SAMM [ Software Dependencies] [ sammisbsd ] activity,
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/implementation/secure_libraries/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 5.3 Secure libraries
1628
1729The use of secure libraries is part of the technology management that helps to fulfil security requirements.
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/implementation/dos_donts/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 5.4 Implementation Do's and Don'ts
1628
1729Implementation demands technical knowledge, skill and experience.
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/verification/guides/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 6.1 Verification guides
1628
1729[ Verification] [ sammv ] is one of the business functions described by the [ OWASP SAMM] [ samm ] .
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/verification/tools/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 6.2 Verification tools
1628
1729[ Verification] [ sammv ] is one of the business functions described by the [ OWASP SAMM] [ samm ] .
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/verification/frameworks/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 6.3 Verification frameworks
1628
1729[ Verification] [ sammv ] is one of the business functions described by the [ OWASP SAMM] [ samm ]
Original file line number Diff line number Diff line change @@ -12,6 +12,18 @@ permalink: /draft/verification/vulnerability_management/
1212
1313{% include breadcrumb.html %}
1414
15+ <style type =" text/css " >
16+ .image-right {
17+ height : 180px ;
18+ display : block ;
19+ margin-left : auto ;
20+ margin-right : auto ;
21+ float : right ;
22+ }
23+ </style >
24+
25+ ![ Developer Guide] ( ../../../../assets/images/dg_logo_bbd.png " OWASP Developer Guide ") {: .image-right }
26+
1527### 6.4 Verification vulnerability management
1628
1729[ Verification] [ sammv ] is one of the business functions described by the [ OWASP SAMM] [ samm ] .
You can’t perform that action at this time.
0 commit comments