{"id":18583,"date":"2022-03-24T09:20:53","date_gmt":"2022-03-24T17:20:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/24\/news-12316\/"},"modified":"2022-03-24T09:20:53","modified_gmt":"2022-03-24T17:20:53","slug":"news-12316","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/24\/news-12316\/","title":{"rendered":"Five OWASP Projects You Should Know About"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/02\/Copy-of-Featured-image-for-Sophos-News-Nak-Sec-36.png\"\/><\/p>\n<p><strong>Credit to Author: stephenlawton| Date: Mon, 21 Mar 2022 10:00:03 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"none\">The Open Web Application Project (OWASP) is famously known for its Top 10 project; however, it supports and promotes many other great projects that could help your organization\u2019s cybersecurity posture.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">There are dozens of open projects supported in some way or capacity by OWASP, and not all of them are strictly web-application specific. I\u2019ve compiled this list of five (non-Top 10) projects that you should know about.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Application Security Verification Standard<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/owasp.org\/www-project-application-security-verification-standard\/\"><b><span data-contrast=\"none\">Application Security Verification Standard<\/span><\/b><\/a><b><span data-contrast=\"none\"> (ASVS) <\/span><\/b><span data-contrast=\"none\">is an open standard to ensure your apps are built securely from a best-practices perspective. While there are hundreds of controls, ASVS is broken down into three tiers depending on the type of data processed by the application.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">What I love most about ASVS is that it\u2019s as prescriptive as it can get, unlike other guidance that can sometimes feel too vague.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Security Knowledge Framework (SKF)\u00a0 \u00a0 <\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Providing secure code training to developers can be costly in terms of time and licensing costs. OWASP maintains the <\/span><a href=\"https:\/\/www.securityknowledgeframework.org\/\"><span data-contrast=\"none\">Security Knowledge Framework<\/span><\/a><span data-contrast=\"none\">, which provides a platform to integrate ASVS and MASVS requirements into your sprint planning while also providing tons of labs for developers to practice secure coding principles.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Cheat Sheet Series<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The OWASP Cheat Sheet series is a goldmine of information if you want sound tactical guidance on application security. It covers everything from Security Assertion Markup Language (SAML) and threat modeling to cryptography and containers.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Nightingale\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Do you dabble\/work in penetration testing? Think it would be nifty to have a container image prebaked with everything you need, including Metasploit? Then check out <\/span><a href=\"https:\/\/owasp.org\/www-project-nightingale\/\"><span data-contrast=\"none\">Nightingale<\/span><\/a><span data-contrast=\"none\">, which does this for you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">CycloneDX\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Software Bill of Materials (SBOMs) are all the rage these days. <\/span><a href=\"https:\/\/cyclonedx.org\/\"><span data-contrast=\"none\">CycloneDX<\/span><\/a><span data-contrast=\"none\"> is the leading SBOM standard designed primarily for security needs. I predict most Software Composition Analysis-type tools will standardize on this for SBOM export features.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/21\/five-owasp-projects-you-should-know-about\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/02\/Copy-of-Featured-image-for-Sophos-News-Nak-Sec-36.png\"\/><\/p>\n<p><strong>Credit to Author: stephenlawton| Date: Mon, 21 Mar 2022 10:00:03 +0000<\/strong><\/p>\n<p>From standards to apps, there&#8217;s something for everyone <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10402,12178,24562,8701],"class_list":["post-18583","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-independent-testing","tag-owasp","tag-products-services","tag-standards"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18583"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18583\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}