Difference between revisions of "Category:BP7 Publish operational security guidelines"

From OWASP
Jump to: navigation, search
m (Undo revision 61295 by C4touBocsi (Talk))
 
Line 1: Line 1:
http://www.textacelelboccna.com
 
 
==Overview==
 
==Overview==
Security does not end when an application is completed and deployed in a production environment. Making the most out of existing network and operational security investments requires that you inform and educate those tasked with monitoring and managing the security of running systems with advice and guidance on the security requirements your application demands, and how best to make use of the capabilities you’ve built into your application.
+
Security does not end when an application is completed and deployed in a production environment. Making the most out of existing network and operational security investments requires that you inform and educate those tasked with monitoring and managing the security of running systems with advice and guidance on the security requirements your application demands, and how best to make use of the capabilities you’ve built into your application.
  
 
{{Template:SecureSoftware}}
 
{{Template:SecureSoftware}}
 
[[Category:CLASP Best Practice]]
 
[[Category:CLASP Best Practice]]
 
[[Category:OWASP CLASP Project]]
 
[[Category:OWASP CLASP Project]]

Latest revision as of 13:03, 22 May 2009

Overview

Security does not end when an application is completed and deployed in a production environment. Making the most out of existing network and operational security investments requires that you inform and educate those tasked with monitoring and managing the security of running systems with advice and guidance on the security requirements your application demands, and how best to make use of the capabilities you’ve built into your application.

Pages in category "BP7 Publish operational security guidelines"

The following 2 pages are in this category, out of 2 total.