OWASP SAMM Project

= Main = 

{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in:
 * Evaluating an organization’s existing software security practices
 * Building a balanced software security assurance program in well-defined iterations
 * Demonstrating concrete improvements to a security assurance program
 * Defining and measuring security-related activities throughout an organization



''OWASP.org is a valuable resource for any company involved with online payment card transactions. Dell uses OWASP’s Software Assurance Maturity Model (OpenSAMM) to help focus our resources and determine which components of our secure application development program to prioritize. Participation in OWASP’s local chapter meetings and conferences around the globe helps us build stronger networks with our colleagues. '', (Michael J. Craigue, Information Security & Compliance, Dell, Inc.)

Want a very quick introduction? See the TBD - Quickstart Guide

For a slightly longer introduction see the latest project presentation.

Browse the SAMM model online here TBD


 * valign="top" style="padding-left:25px;width:200px;" |

Quick Download
Download OWASP SAMM!

News and Events
Please see the News and Talks tabs

Change Log

 * TBD

Email List
Questions? Please ask on the SAMM Mailing List

Project Leaders
Project Leaders Seba Deleersnyder Pravir Chandra Kuai Hinojosa Bart De Win

Classifications

 * }

= Talks =

= News =

= ZAP Gear =

Yes, you can now buy ZAP related gear!

Its your chance to show your support for the project, c/o `CafePress`.

Click on the tshirt to enter the ZAP Gear Store:



= Supporters =

ZAP is developed by a worldwide team of volunteers.

But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:


 * OWASP
 * Mozilla
 * Sage
 * Google
 * Microsoft
 * Hacktics, Ernst & Young
 * DinoSec
 * Denim Group
 * Aspect Security
 * SecureIdeas
 * UtiliSec
 * encription

= Functionality = Some of ZAP's functionality:


 * Intercepting Proxy
 * Traditional and AJAX spiders
 * Automated scanner
 * Passive scanner
 * Forced browsing
 * Fuzzer
 * Dynamic SSL certificates
 * Smartcard and Client Digital Certificates support
 * Web sockets support
 * Support for a wide range of scripting languages
 * Plug-n-Hack support
 * Authentication and session support
 * Powerful REST based API
 * Automatic updating option
 * Integrated and growing marketplace of add-ons

= Features = Some of ZAP's features:


 * Open source
 * Cross platform
 * Easy to install (just requires java 1.7)
 * Completely free (no paid for 'Pro' version)
 * Ease of use a priority
 * Comprehensive help pages
 * Fully internationalized
 * Translated into over 20 languages
 * Community based, with involvement actively encouraged
 * Under active development by an international team of volunteers

ZAP is a fork of the well regarded Paros Proxy.

= Languages =

ZAP supports the following languages:


 * English
 * Arabic
 * Bosnian
 * Brazilian Portuguese
 * Chinese
 * Danish
 * Filipino
 * French
 * German
 * Greek
 * Indonesian
 * Italian
 * Japanese
 * Korean
 * Persian
 * Polish
 * Russian
 * Sinhala
 * Spanish
 * Urdu

You can use Crowdin to help improve these translations or add new ones right now!

= Roadmap =

Release 2.3.0
ZAP 2.3.0 has been released, which includes:
 * A ZAP 'lite' version in addition to the existing 'full' version
 * View, intercept, manipulate, resend and fuzz client-side (browser) events
 * Enhanced authentication support
 * Support for non standard apps
 * Input Vector scripts
 * Scan policy - fine grained control
 * Advanced Scan dialog
 * Extended command line options
 * More API support
 * Internationalized help file
 * Keyboard shortcuts
 * New UI options
 * More functionality moved to add-ons
 * New and improved active and passive scanning rules

For more details see http://code.google.com/p/zaproxy/wiki/HelpReleases2_3_0

Release 2.4.0
The major features we are currently working on include:
 * Client side scanning
 * Advanced fuzzing
 * Advanced access control testing
 * SOAP service scanning
 * Sequence scanning
 * Sequence detection

The date and exact features that will be included in 2.4 have not been finalized.

= Get Involved =

Involvement in the development of ZAP is actively encouraged!

You do not have to be a security expert in order to contribute.

Some of the ways you can help:

Feature Requests
Please raise new feature requests as enhancement requests here: http://code.google.com/p/zaproxy/issues/list

If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly.

Feedback
Please use the zaproxy-users Google Group for feedback:
 * What do like?
 * What don't you like?
 * What features could be made easier to use?
 * How could the help pages be improved?

Log issues
Have you had a problem using ZAP?

If so and its not already been logged then please report it

Localization
Are you fluent in another language? Can you help translate ZAP into that language?

You can use Crowdin to do that!

Development
If you fancy having a go at adding functionality to ZAP then please get in touch via the zaproxy-develop Google Group.

Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!

If you actively contribute to ZAP then you will be invited to join the project.