TODO: Top 10 Defenses

Revision as of 19:59, 11 October 2011 by Vanderaj (Talk | contribs)

Jump to: navigation, search

Project Information:template TODO: Top 10 Defenses Project

The OWASP TODO: Top 10 Defenses

Welcome to the OWASP TODO: Top 10 Defenses Project! This project is the comprehensive reference for all OWASP projects and application security in general. All of the materials here are free and open source.

By now you can:

  • TOC
  • TBA
  • Volunteer to help this project!


We are currently seeking volunteers who will help developing stub/empty articles listed bellow and bring it up to a production level of quality. Join us now to take part in this historic effort, just drop a line to Andrew van der Stock!

What's In It?


TODO: Top 10 Defenses Backlog

  • Volunteers
  • Roadmap
  1. Security Architecture (including incorporating agile ideas)
  2. Use a (more) secure development frameworks and leverage enterprise frameworks (UAG, etc)
  3. Input validation
  4. Output Encoding
  5. Identity: Authentication and Session Management
  6. Access Control (service / controller, data, URL, function / CSRF, presentation, etc)
  7. Data Protection (Data at rest, including in cloud)
  8. Audit, Logging and Error Handling
  9. Secure Configuration
  10. Secure Communications (Data in transit)

What's It For?


Why This Approach?


How Is It Maintained?

  • Agile creation - regular releases, time boxed, no heavy weight (e.g. 1.0 2.0) releases


Related Projects


Feedback and Participation:

We hope you find the OWASP TODO: OWASP Top 10 Defenses Project useful. Please contribute to the Project by volunteering for one of the tasks, sending your comments, questions, and suggestions to To join the OWASP TODO: OWASP Top 10 Defences Project mailing list or view the archives, please visit the subscription page.