Главная
Study mode:
on
1
Intro
2
About OWASP
3
OWASP Top 10 2017 - OWASP A1 - Injection
4
OWASP Top 10 2017 - A1 - SQL Injection
5
OWASP Top 10 2017 - A5 - Broken Access Control
6
OWASP Top 10 2017 - Broken Access Control
7
OWASP Top 10 - Summary
8
OWASP Proactive Controls
9
Proactive Controls - C7 - Enforce Access Control
10
Proactive Controls - Summary
11
OWASP Application Security Verification Standard
12
OWASP ASVS - Verification Levels
13
ASVS-V5 - Validation, Sanitization, Encoding
14
ASVS - V4.2 - Operation Access Control
15
OWASP ASVS - Summary
16
OWASP Benchmark
17
ASVS - Security Tools references
18
Software Security Issues
19
Software Security Definition
20
Detection Tools
21
Protection Tools - Example: Integrity Checks
22
Protection Tools - Spring Integration
Description:
Explore a comprehensive conference talk from Spring I/O 2019 that delves beyond the OWASP Top 10 to address a broader spectrum of application security issues. Learn about the OWASP Top 10 2017, OWASP Application Security Verification Standard (ASVS), and other OWASP standards that provide a more advanced perspective on security. Discover practical examples of addressing security risks in Spring Applications through manual and programmatic solutions, as well as security provider tools like Application Security Testing (AST), Web Application Firewalls (WAF), and Runtime Application Self-Protection (RASP). Gain insights into various OWASP projects, including Proactive Controls and OWASP Benchmark, and understand their importance in developing secure applications. Explore software security issues, detection tools, and protection mechanisms, with a focus on integrating security measures within Spring applications.

From OWASP Top 10 to Secure Applications

Spring I/O
Add to list