Difference between revisions of "ASDR TOC Principles"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
  
 
* 1 [[Assume attackers have source code]]
 
* 1 [[Assume attackers have source code]]
* 2 [[Avoid security by obscurity]]
+
* 2 [[Avoid reliance on security by obscurity]]
 
* 3 [[CLASP Security Principles]]
 
* 3 [[CLASP Security Principles]]
 
* 4 [[Defense in depth]]
 
* 4 [[Defense in depth]]
Line 19: Line 19:
 
* 17 [[Use encapsulation]]
 
* 17 [[Use encapsulation]]
 
* 18 [[Don't trust user input]]
 
* 18 [[Don't trust user input]]
* 19 [[Don't rely on security by obscurity]]
+
* 19 [[Reduce Surface Area]]
* 20 [[Reduce Surface Area]]
+
  
 
Back to [[ASDR_Table_of_Contents|TOC]]
 
Back to [[ASDR_Table_of_Contents|TOC]]
  
 
[[Category:OWASP ASDR Project]]
 
[[Category:OWASP ASDR Project]]

Revision as of 16:33, 19 June 2008

Back to TOC

Back to TOC