Category:OWASP Top Ten Controls Project

Jump to: navigation, search


This is a placeholder page for the upcoming OWASP Top Ten Controls 2013 document.

This project, similar to the OWASP Top Ten Risks document, is meant to directly bring awareness to controls that developers need to use in secure web application development.

OWASP Top Ten Proactive Controls

These controls may include:

  1. Query Parameterization per
  2. Data Protection
    1. Hashed, Salted and Stretched Password Storage per
    2. Cryptographic Storage of sensitive user data like PII information
    3. Use of TLS in transit
  3. Output Encoding per
  4. Forgot Password Workflow per
  5. Content Security Policy
  6. Secure JSON Parsing
  7. Input Validation per
  8. Access Control Design
  9. Virtual Patching
  10. Secure Requirements and Design

Others to consider

  1. Accountability
    1. Logging
    2. Error handling and structured exceptions
    3. Security incident event management
  2. Re-authentication (authenticating individual transactions)
  3. CSRF Tokens
  4. Framebusting
  5. Defense to prevent
  6. Configuration Issues

Glossary of Terms


This category currently contains no pages or media.