Application Security Program Quick Start Guide

{| width="100%" cellspacing="0" cellpadding="10"
 * - valign="top"
 * width="70%" style="background:#d9e9f9" |

= The Application Security Program Quick Start Guide =

Placeholder

Contents

 * Preface
 * About this guide
 * Audience

 **Key Activities:   *Key Questions:   *Day 2  **Key Activities:   *Day 3  **Key Activities:   *Day 4  **Key Activities:   *Day 5  **Key activities: 
 * Day 1
 * Evaluation
 * Management
 * Security
 * IT Ops
 * Engineering Groups (inc. QA)/Development
 * Asset Discovery
 * Asset Risk Prioritization
 * Communication Plan
 * Vulnerability Assessments
 * Vulnerability delivery
 * Measured Metrics
 * Compensating Controls
 * Mitigating Controls
 * Remediation Prioritization

Licensing
The OWASP Application Security Program Quick Start Guide is free to use. It is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license. You are free to:
 * Share — copy and redistribute the material in any medium or format
 * Adapt — remix, transform, and build upon the material for non-commercial use

The licensor cannot revoke these freedoms as long as you follow the license terms.


 * width="100" style="max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;" cellpadding="0" |


 * width="30%" style="background:#eeeeee" |

=Credits =

Project lead and authors

 * GabrielGumbs
 * JeremiahGrossman
 * RobertHansen
 * Jerry Hoff

Other contributors
Co-authors, contributors and reviewers:


 * MattJohansen

= Further Information =

Application Security Program Quick Start Guide
The OWASP Application Security Program Quick Start Guide is also available as
 * Free downloadable PDF

For full information about the Application Security Program Quick Start Guide, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:
 * The Application Security Program Quick Start Guide Project Page


 * }