Difference between revisions of "ASDR TOC Principles"

From OWASP
Jump to: navigation, search
 
(12 intermediate revisions by 4 users not shown)
Line 1: Line 1:
* 1 Assume attackers have source code
+
{{template:CandidateForDeletion}}
* 2 Avoid security by obscurity
+
* 3 CLASP Security Principles
+
* 4 Defense in depth
+
* 5 Detect intrusions
+
* 6 Don’t trust infrastructure
+
* 7 Don’t trust services
+
* 8 Establish secure defaults
+
* 9 Fail securely
+
* 10 Fix security issues correctly
+
* 11 Keep security simple
+
* 12 Least privilege
+
* 13 Minimize attack surface area
+
* 14 Positive security model
+
* 15 Secure Coding Principles
+
* 16 Separation of duties
+
* 17 Use encapsulation
+
  
Back to [[ASDR_Table_of_Contents|TOC]]
+
#REDIRECT [[::Category:Principle]]
  
[[Category:OWASP ASDR Project]]
+
 
 +
# [[Assume attackers have source code]]
 +
# [[Avoid security by obscurity]]
 +
# [[Input Validation]]
 +
# [[Defense in depth]]
 +
# [[Detect intrusions]]
 +
# [[Don’t trust infrastructure]]
 +
# [[Don’t trust services]]
 +
# [[Establish secure defaults]]
 +
# [[Fail securely]]
 +
# [[Fix security issues correctly]]
 +
# [[Keep security simple]]
 +
# [[Least privilege]]
 +
# [[Minimize attack surface area]]
 +
# [[Positive security model]]
 +
# [[Secure Coding Principles]]
 +
# [[Separation of duties]]
 +
# [[Use encapsulation]]
 +
# [[Don't trust user input]]
 +
# [[The Insecure-Bootstrapping Principle]]

Latest revision as of 10:43, 11 April 2009


This page was marked to be reviewed for deletion.


#REDIRECT :Category:Principle


  1. Assume attackers have source code
  2. Avoid security by obscurity
  3. Input Validation
  4. Defense in depth
  5. Detect intrusions
  6. Don’t trust infrastructure
  7. Don’t trust services
  8. Establish secure defaults
  9. Fail securely
  10. Fix security issues correctly
  11. Keep security simple
  12. Least privilege
  13. Minimize attack surface area
  14. Positive security model
  15. Secure Coding Principles
  16. Separation of duties
  17. Use encapsulation
  18. Don't trust user input
  19. The Insecure-Bootstrapping Principle