OWASP Video Game Security Framework

= About the Project =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

OWASP Video Game Security Framework (VGSF)
OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models

Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions.

With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.

The framework is comprised of five discipline areas that could produce many best practice methodologies:

I. Business Strategy & Risk

'''II. Governance & Compliance'''

'''III. Prevention'''

This will be one of the largest sections as it is comprised of many different aspects of overall cyber security

'''IV. Management'''

V. Service Delivery/ Support

Licensing
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


 * style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the OWASP Video Game Security Framework?
The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.

The target audience for the project includes:


 * Game Publishers
 * Game Developers
 * Security Professionals
 * Consumer Gamers
 * Quality Assurance Testers
 * Business Stakeholders in the Gaming Industry
 * Industry Enthusiasts

Project Leaders

 * Romen Brewer

Contributors

 * TBD

Related Projects

 * OWASP Game Security Framework Project
 * OWASP Web Top 10
 * OWASP Mobile Security


 * style="padding-left:25px;width:200px;" valign="top" |

Collaboration
Join the discord channel: 

Quick Download
COMING SOON

News and Events

 * April, 2019: Site Creation and Discord channel creation.

Classifications

 * }

= Business Strategy & Risk =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Business Strategy & Risk
The following is a list of the attack surfaces that can be found in video games of various types.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the Business Strategy & Risk Section?
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.

Sub-project Leader

 * Romen Brewer

Related Projects

 * 
 * The OWASP Mobile Top 10 Project
 * The OWASP Web Top 10 Project

Collaboration
Join the discord channel: 

Quick Download

 * Coming Soon

News and Events

 * Coming Soon


 * }

= Governance & Compliance =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Governance & Compliance
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the Game Security Vulnerabilities Project?
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.

Sub-project Leader

 * ENTER NAME

Related Projects

 * OWASP Mobile Security
 * OWASP Web Top 10

Collaboration
The Slack Channel

Resources

 * Top 10 IoT Vulnerabilities from 2014

News and Events

 * Coming Soon


 * }

= Prevention =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Prevention
This list refers to what a given attacker might use to take advantage of a given bug within the game.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

The Exploits Project
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.

Sub-project Leader

 * Romen Brewer

Related Projects

 * OWASP Mobile Security
 * OWASP Web Top 10

Collaboration
The Slack Channel

Resources

 * Top 10 IoT Vulnerabilities from 2014

News and Events

 * Coming Soon


 * }

= Management =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Management
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the Attacker Goals Project
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.

Sub-project Leader

 * Romen Brewer

Related Projects

 * OWASP Mobile Security
 * OWASP Web Top 10

Collaboration
The Slack Channel

Resources

 * Top 10 IoT Vulnerabilities from 2014

News and Events

 * Coming Soon


 * }

= Service Delivery/ Support =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Service Delivery/ Support
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the Negative Outcomes Project?
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.

Project Leader

 * Romen Brewer

Related Projects

 * OWASP Mobile Security
 * OWASP Web Top 10

Collaboration
The Slack Channel

Resources

 * Top 10 IoT Vulnerabilities from 2014

News and Events

 * Coming Soon


 * }

= Resources =



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |

Resources
This page will list additional resources related to game security that may provide more detailed context.


 * style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |

What is the Game Security Vulnerabilities Project?
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.

Project Leaders

 * Romen Brewer

Related Projects

 * OWASP Mobile Security
 * OWASP Web Top 10

Collaboration
Join the discord channel: 

Resources

 * Top 10 IoT Vulnerabilities from 2014

News and Events

 * Coming Soon

= Trending =
 * }

Video Game Trends
This section is dedicated to trends in gaming and how it can evaluated from a security perspective

Working Data Collection Spreadsheet:

https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0



= Community =

The VGSF team has open opportunities for individuals to collaborate and contribute to the project.

If you have interest in helping, reach out to us and we'll make you a contributor.
 * Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.
 * Adding content to any of the various sections
 * Input from avid gamers on how useful this is to them
 * Input from app security experts
 * Input from security types working at gaming companies
 * Input from game company business types

= Testing Tools =

Commonly Used Game Hacking Tools
=Project About=