Category:OWASP Security Analysis of Core J2EE Design Patterns Project
- The project’s overall goal is to...
- Be a design-time security reference for developers implementing common patterns independent of specific platforms and frameworks. Pattern usage is ubiquitous in software development, and the best patterns transcend specific languages and/or frameworks; analyzing the most pivotal frameworks in web applications allows us to build security advice that developers will use far in the future. At the same time, analyzing common patterns helps manual penetration testers and source code reviewers understand where to look for vulnerabilities within an application.
- In the near term, we are focused on the following tactical goals...
1. Convert existing Core J2EE Patterns analysis word document into wiki format,
2. Solicit feedback and add additional advice to each pattern,
3. Determine next steps in group:
3.1. Add source code examples,
3.2. Start reviewing other patterns, such as Patterns of Enterprise Application Architecture, Enterprise Integration Patterns, or .Net Patterns.
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What does this OWASP project release offer you?
Today’s secure software developers have a wealth of secure development resources available to them from groups like the Open Web Application Security Project (OWASP) and the Web Application Security Consortium (WASC) . An increasing array of tools affords developers an unprecedented ability to engineer trusted software. At Security Compass, we take pride in being part of the secure software movement through our efforts such as the Exploit-Me series of security testing tools. In our view, however, the majority of resources available currently focus on two phases of the Software Development Life Cycle: development and test. While the application security community has developed excellent higher-level process guidance on the design phase through efforts like the Common Lightweight Application Security Process (CLASP) and the Open Security Assurance Maturity Model (Open SAMM) , developers often struggle with finding concrete, technical advice on how to secure their application designs.
Most application security experts focus on a single activity for integrating design into the SDLC: threat modeling . Threat modeling is excellent at approximating an application’s attack surface but, in our experience, developers sometimes do not have the time, budget or security know-how to build an adequate threat model. Perhaps more importantly, developers cannot create a comprehensive threat model until they complete the application design.
This reference guide aims at dispensing security best practices to developers to make security decisions during design. We focus on one of the most important concepts in modern software engineering: design patterns. Ever since the publication of the seminal Design Patterns Book , developers have reused common patterns such as Singleton and Factory Method in large-scale software projects. Design patterns offer a common vocabulary to discuss application design independent of implementation details. One of the most critically acclaimed pattern collections in the Java Enterprise Edition (JEE) community is the Core J2EE Patterns book by Deepak Alur, Dan Malks and John Crupi . Developers regularly implement patterns such as “Application Controller”, “Data Access Object” or “Session Façade” in large, distributed JEE applications and in frameworks such as Spring and Apache Struts . We aim to dispense security best practices so that developers can introduce security features and avoid vulnerabilities independent of their underlying technology choices such as which Model View Controller (MVC) framework to use.
Java developers currently have access to patterns for security code (e.g. how to develop authentication, how to implement cryptography) such as the Core Security Patterns book. We hope our guide will help address the critical shortage of advice on securely coding using existing design patterns. Your feedback is critical to improving the quality and applicability of the best practices listed in the Security Analysis of Core J2EE Design Patterns. Please contact the authors at email@example.com with comments or questions and help improve the guide for future developers.
This category currently contains no pages or media.