Difference between revisions of "OWASP Incident Response Project"
m (→Road Map and Getting Involved)
|Line 13:||Line 13:|
Revision as of 20:47, 9 April 2014
OWASP Incident Response Project
The OWASP Incident Response Project will provide users with a current set of tools and best practices for dealing with a hacked web application.
This project is a guide of suggested best practices for stand-alone IR of a web application on dedicated hardware that you have 100% access to as well as when the application is part of a cloud service offering. The goal is to provide a best practices checklist that can be used to ensure chain of custody and to assist with investigations of root-cause.
Write a description that is just a few paragraphs long
The OWASP Incident Response Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
What is the OWASP Incident Response Project?
The OWASP Incident Response Project provides:
Link to presentation
News and Events
This project can be purchased as a print on demand book from Lulu.com
As of 9-April-2014, the priorities are:
- Collect materials in the public domain and list them as reference points.
- Review existing materials and extract the Top 10 most important things for common common enviorments
- Draft v1.0 of the guide
Involvement in the development and promotion of OWASP Incident Response Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Proof Reading
- Graphic Design
- Conduct Industry Survey
- <insert your idea>
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?