Skip to content

Commit c29c008

Browse files
authored
add content for flagship projects
2 parents 4082f01 + 31c9391 commit c29c008

File tree

43 files changed

+193
-78
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+193
-78
lines changed

.wordlist.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -423,3 +423,9 @@ linux
423423
Katana
424424
katana
425425
VirtualBox
426+
defacto
427+
APIT
428+
enum
429+
intel
430+
subcommand
431+
subcommands
-28.7 KB
Binary file not shown.
11.1 KB
Binary file not shown.

draft/04-foundations/05-top-ten.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ The OWASP Top Ten is a very well known list of web application security risks,
1818
and is included by the OWASP Software Assurance Maturity Model [(SAMM)][samm]
1919
in the Education & Guidance practice within the Governance business function.
2020

21-
### Overview
21+
#### Overview
2222

2323
The OWASP [Top 10 Web Application Security Risks][top10] project is probably the most well known security concept
2424
within the security community, achieving wide spread acceptance and fame soon after its release in 2003.
@@ -159,7 +159,7 @@ especially for cloud services and more complex application architectures.
159159

160160
This is a new category introduced in 2021 with a single (for now) [Cheat Sheet][a10cs] that deals with SSRF.
161161

162-
### OWASP top tens
162+
#### OWASP top tens
163163

164164
There are various 'Top 10' projects created by OWASP that, depending on the context,
165165
may also be referred to as 'OWASP Top 10'. Here is a list of the stable 'OWASP Top 10' projects:

draft/06-design/01-threat-modeling/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ order:
1111

1212
{% include breadcrumb.html %}
1313

14-
## 4.1 Threat modeling
14+
### 4.1 Threat modeling
1515

1616
Referring to the [Threat Modeling Cheat Sheet][tmcs],
1717
threat modeling is a structured approach of identifying and prioritizing potential threats to a system.

draft/06-design/01-threat-modeling/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ permalink: /draft/design/threat_modeling/
1212

1313
{% include breadcrumb.html %}
1414

15-
## 4.1 Threat modeling
15+
### 4.1 Threat modeling
1616

1717
Referring to the [Threat Modeling Cheat Sheet][tmcs],
1818
threat modeling is a structured approach of identifying and prioritizing potential threats to a system.

draft/06-design/02-web-app-checklist/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ order:
1111

1212
{% include breadcrumb.html %}
1313

14-
## 4.2. Web application checklist
14+
### 4.2 Web application checklist
1515

1616
Checklists are a valuable resource for development teams.
1717
They provide structure for establishing good practices and processes

draft/06-design/02-web-app-checklist/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ permalink: /draft/design/web_app_checklist/
1212

1313
{% include breadcrumb.html %}
1414

15-
## 4.2. Web application checklist
15+
### 4.2 Web application checklist
1616

1717
Checklists are a valuable resource for development teams.
1818
They provide structure for establishing good practices and processes

draft/07-implementation/01-documentation/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ order:
1111

1212
{% include breadcrumb.html %}
1313

14-
## 5.1 Documentation
14+
### 5.1 Documentation
1515

1616
Documentation is used here as part of the SAMM [Training and Awareness][sammgegta] activity,
1717
which in turn is part of the SAMM [Education & Guidance][sammgeg] security practice

draft/07-implementation/01-documentation/03-cheatsheets.md

Lines changed: 31 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,29 +14,45 @@ permalink: /draft/implementation/documentation/cheatsheets/
1414

1515
### 5.1.3 Cheat Sheet Series
1616

17-
The [OWASP Cheat Sheet Series][cheatsheets] were created to provide a concise collection of high value information
17+
The [OWASP Cheat Sheet Series][cheatsheets] provide a concise collection of high value information
1818
on a wide range of specific application security topics.
19-
The cheat sheets are created by various application security professionals who have expertise in specific topics.
19+
The cheat sheets have been created by various application security professionals who have expertise in specific topics.
2020

2121
The Cheat Sheet Series [documentation project][cheatproject] is an OWASP Flagship Project in constant development.
2222

23-
#### What is the Cheat Sheet Series?
23+
#### What are the Cheat Sheets?
2424

25-
To Do: go into more detail about the Cheat Sheet Series so that a developer
26-
can gain an overview of what this documentation project can provide for them.
25+
The Cheat Sheets are a series of self contained articles written by the security community
26+
on a specific subject within the security domain.
27+
The topics covered by the cheat sheets is wide, ranging from AJAX Security to XS (Cross Site) vulnerabilities.
28+
Each cheat sheet provides an introduction to the subject which provides enough information to understand the basic concept.
29+
It then goes on to describe its subject in more detail, often supplying recommendations or best practices.
30+
31+
The OWASP Cheat Sheets are a common body of knowledge created by the software security community
32+
for a wide audience that is not confined to the security community.
2733

2834
#### Why use them?
2935

30-
To Do: provide more context for the Cheat Sheet Series that allows developers to determine
31-
whether to use them in their project.
36+
The OWASP Cheat Sheet Series provide developers and security engineers with most, and perhaps all,
37+
of the information on security topics that they will need to do their job.
38+
In addition the Cheat Sheets are regarded as authoritative: it is recommended to follow the advice in these Cheat Sheets.
39+
If a web application does not follow the recommendations in a cheat sheet, for example,
40+
then the implementation could be challenged during the testing or review processes.
3241

33-
#### How to apply them
42+
#### How to use them
3443

3544
The OWASP Spotlight series provides a good overview of using this documentation:
3645
'Project 4 - [Cheat Sheet Series][spotlight04]'.
3746

38-
To Do: give a brief outline of how applying the Cheat Sheet Series documentation provides value for a web development team.
39-
Do not repeat the project documentation itself; ideally provide a primer and a pointer to the documentation.
47+
There are a lot of cheat sheets in the OWASP Cheat Sheet Series;
48+
91 of them as of March 2024 and this number is set to increase.
49+
The OWASP community recognises that this may become overwhelming at first, and so has arranged them in various ways:
50+
51+
* [Alphabetically][cheatsheet-alpha]
52+
* Indexed to follow the [ASVS project][cheatsheet-asvs] or the [MASVS project][cheatsheet-masvs]
53+
* Arranged in sections of the [OWASP Top 10][cheatsheet-top10] or the [OWASP Proactive Controls][cheatsheet-proactive]
54+
55+
The cheat sheets are continually being updated and are always open to contributions from the security community.
4056

4157
----
4258

@@ -45,6 +61,11 @@ then [submit an issue][issue070103] or [edit on GitHub][edit070103].
4561

4662
[cheatproject]: https://owasp.org/www-project-cheat-sheets/
4763
[cheatsheets]: https://cheatsheetseries.owasp.org/
64+
[cheatsheet-alpha]: https://cheatsheetseries.owasp.org/Glossary.html
65+
[cheatsheet-asvs]: https://cheatsheetseries.owasp.org/IndexASVS.html
66+
[cheatsheet-masvs]: https://cheatsheetseries.owasp.org/IndexMASVS.html
67+
[cheatsheet-proactive]: https://cheatsheetseries.owasp.org/IndexProactiveControls.html
68+
[cheatsheet-top10]: https://cheatsheetseries.owasp.org/IndexTopTen.html
4869
[edit070103]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/07-implementation/01-documentation/03-cheatsheets.md
4970
[issue070103]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2007-implementation/01-documentation/03-cheatsheets
5071
[spotlight04]: https://youtu.be/S1cVYRDeiPQ

0 commit comments

Comments
 (0)