OWASP Java Project Roadmap

Goals
The OWASP Java Project's overall goal is to...

Produce materials that show J2EE architects, developers, and deployers how to deal with most common application security problems throughout the lifecycle.

In the near term, we are focused on the following tactical goals:


 * 1) Provide examples of how to prevent Cross Site Scripting attacks in popular web frameworks
 * 2) Provide examples of how to prevent SQL Injection in popular data access frameworks
 * 3) Provide examples of how to prevent LDAP injection in Java
 * 4) A practical guide to implementing a security policy for a Java web application
 * 5) Secure configuration guides for popular application servers

Current Tasks

 * Call for volunteers - Join the mailing list, read the Tutorial and get started!
 * Refine this roadmap in the discussion.

Ideas
Please submit your ideas for the OWASP Java Project here (you can sign your ideas by adding four tilde characters like this ~ )
 * It would be useful to have a library of J2EE security resources on the web. In addition to URLs, I think these should have short summaries that explain what the resource is about.  I've clicked on far too many "J2EE Security" links only to find that the article is about implementing access control in Tomcat.
 * A tool that automatically generates a security policy for a given application could be useful. The tool is first run in learning mode where it maps all the accesses that the application attempts and then generates a policy based on those access attempts.
 * Note: I built such a tool back in the mid-1990's. It's a custom security manager that intercepts all accesses and has a "learn" mode. If someone is willing to take on the project, I'd be happy to dig it up. Jeff Williams 16:18, 8 June 2006 (EDT)
 * I'll be happy to take this on - what status is the code currently in? --Stephendv 09:15, 12 June 2006 (EDT)
 * I think we should consider revamping the roadmap with specific article titles and content that we'd like to get written. For example, I'm considering writing an article on how to set up Eclipse to do a code review. It would be nice to link that in here, but I'm not sure just where.  I was thinking something like this....


 * Using Eclipse for security code review
 * This article will cover setting up Eclipse with plugins like FindBugs, jlint, PMD, and Metrics. Then it will explore how you can use the various search and code browsing functions to find and diagnose potential vulnerabilities. Jeff Williams 15:01, 22 June 2006 (EDT)


 * Sounds like some excellent content! Couldn't this fit in to the Code Analysis Tools  section (even if we have to rename the section to something like "Code Analysis Techniques")?  Since the Eclipse example is something core to the Java project, I think it should be placed under a real heading, but for other miscellaneous content, I've created a Resources section which could include external articles, books and other resources. Stephendv 04:18, 26 June 2006 (EDT)

Design considerations

 * Architectural considerations
 * EJB Middle tier
 * Web Services Middle tier
 * Spring Middle tier

Noteworthy Frameworks

 * Acegi
 * Commons validator
 * jGuard
 * Stinger

Java Security Basics

 * Class Loading
 * Bytecode verifier
 * The Security Manager and security.policy file

Input Validation

 * Overview

SQL Injection

 * Overview
 * Prevention
 * White Listing
 * Prepared Statements
 * Stored Procedures
 * Hibernate
 * Ibatis
 * Spring JDBC
 * EJB 3.0
 * JDO

Cross Site Scripting (XSS)

 * Overview
 * Prevention
 * White Listing
 * Manual HTML Encoding
 * Preventing XSS in popular Web Frameworks
 * JSP/JSTL
 * Struts
 * Spring MVC
 * Java Server Faces
 * WebWork
 * Wicket
 * Tapestry
 * CSRF attack

LDAP Injection

 * Overview
 * Prevention

XPATH Injection

 * Overview
 * Prevention

Miscellaneous Injection Attacks

 * HTTP Response splitting
 * Command injection - Runtime.getRuntime.exec

Authentication

 * Storing credentials
 * Hashing
 * SSL Best Practices
 * CAPTCHA systems (such as jcaptcha)
 * Container-managed authentication with Realms
 * JAAS Authentication
 * Password length & complexity

Session Management

 * Logout
 * Session Timeout
 * Absolute Timeout
 * Session Fixation
 * Terminating sessions
 * Terminating sessions when the browser window is closed

Authorization

 * In presentation layer
 * In business logic
 * In data layer
 * Declarative v/s Programmatic
 * web.xml configuration
 * Forced browsing
 * JAAS
 * EJB Authorization
 * Acegi
 * JACC
 * Check horizontal privilege

Encryption

 * JCE
 * Storing db secrets
 * Encrypting JDBC connections
 * JSSE
 * Random number generation

Error Handling & Logging

 * Output Validation
 * Custom Errors
 * Logging - why log? what to log? log4j, etc.
 * Exception handling techniques
 * fail-open/fail-closed
 * resource cleanup
 * finally block
 * swallowing exceptions
 * Exception handling frameworks
 * Servlet spec - web.xml
 * JSP errorPage
 * Web application forensics

Web Services Security

 * SAML
 * (X)WS-Security
 * SunJWSDP
 * XML Signature (JSR 105)
 * XML Encryption (JSR 106)

Code Analysis Tools

 * Introduction
 * FindBugs
 * Creating custom rules
 * PMD
 * Creating custom rules
 * JLint
 * Jmetrics

Securing Popular J2EE Servers

 * Securing Tomcat
 * Securing JBoss
 * Securing WebLogic
 * Securing WebSphere
 * Others...

Defining a Java Security Policy

 * PolicyTool
 * jChains (www.jchains.org)

Protecting Binaries

 * Bytecode Manipulation Tools and Techniques
 * Bytecode obfuscation (proguard)
 * Convert bytecode to native machine code
 * jarsigner