Skip to content

Commit

Permalink
layout change
Browse files Browse the repository at this point in the history
  • Loading branch information
Katy Anton committed Apr 7, 2024
1 parent 53f2b43 commit 45280b1
Show file tree
Hide file tree
Showing 12 changed files with 45 additions and 20 deletions.
4 changes: 2 additions & 2 deletions v4/en/0x01-about-owasp.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, AboutOWASP
document: OWASP Top Ten Proactive Controls 2024
order: 1
order: 401
permalink: /v4/en/

---
Expand Down
2 changes: 1 addition & 1 deletion v4/en/0x02-about-project.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
layout: col-sidebar
tags: OWASP Top Ten Proactive Controls 2024, About Project
document: OWASP Top Ten Proactive Controls 2024
order: 2
order: 402

---

Expand Down
2 changes: 1 addition & 1 deletion v4/en/0x03-about-structure.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, Document Structure
document: OWASP Top Ten Proactive Controls 2024
order: 403
Expand Down
4 changes: 2 additions & 2 deletions v4/en/c10.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C10, Stop Server Side Request Forgery
document: OWASP Top Ten Proactive Controls 2024
order: 14
order: 414

---

Expand Down
4 changes: 2 additions & 2 deletions v4/en/c2-crypto.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C2, Use Cryptography the proper way
document: OWASP Top Ten Proactive Controls 2024
order: 6
order: 406
permalink: /v4/en/c2-crypto

---
Expand Down
5 changes: 3 additions & 2 deletions v4/en/c3.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C3, Validate all Input and Handle Exceptions
document: OWASP Top Ten Proactive Controls 2024
order: 7
order: 407
permalink: /v4/en/c3-validate-all-input

---

Expand Down
5 changes: 3 additions & 2 deletions v4/en/c4.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C4, Use Secure Architecture Patterns
document: OWASP Top Ten Proactive Controls 2024
order: 8
order: 408
permalink: /v4/en/c4-secure-architecture

---

Expand Down
4 changes: 2 additions & 2 deletions v4/en/c5.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C5, Secure By Default Configurations
document: OWASP Top Ten Proactive Controls 2024
order: 9
order: 409

---

Expand Down
4 changes: 2 additions & 2 deletions v4/en/c7.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C7, Implement Digital Identity
document: OWASP Top Ten Proactive Controls 2024
order: 11
order: 411

---
# C7: Implement Digital Identity
Expand Down
4 changes: 2 additions & 2 deletions v4/en/c8.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C8, Help the Browser defend its User
document: OWASP Top Ten Proactive Controls 2024
order: 12
order: 412

---

Expand Down
4 changes: 2 additions & 2 deletions v4/en/c9.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---

layout: col-sidebar
layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, C9, Implement Security Logging and Monitoring
document: OWASP Top Ten Proactive Controls 2024
order: 13
order: 413

---

Expand Down
23 changes: 23 additions & 0 deletions v4/en/final-word.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---

layout: col-document
tags: OWASP Top Ten Proactive Controls 2024, Final Word
document: OWASP Top Ten Proactive Controls 2024
order: 416

---

# Final word

This document should be seen as a starting point rather than a comprehensive set of techniques and practices. We want to again emphasize that this document is intended to provide initial awareness around building secure software.

Good next steps to help build an application security program include:

1. To understand some of the risks in web application security please review the [OWASP Top Ten](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project) .
2. A secure development program should include a *comprehensive list of security requirements* based on a standard such as the [OWASP (Web) ASVS](https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project) and the [OWASP (Mobile) MASVS](https://github.com/OWASP/owasp-masvs).
3. To understand the core building blocks of a secure software program from a more macro point of view please review the [OWASP OpenSAMM project](https://www.owasp.org/index.php/OWASP_SAMM_Project).


If you have any questions for the project leadership team, please contact with your questions, comments, and ideas at our GitHub project repository: https://github.com/OWASP/www-project-proactive-controls/issues


0 comments on commit 45280b1

Please sign in to comment.