OWASP Cheat Sheet – Cryptographic Storage Introduction This article provides a simple model to follow when implementing solutions to protect data at rest. Passwords should not...
OWASP Cheat Sheet – AJAX Security Introduction This document will provide a starting point for AJAX security and will hopefully be updated and expanded reasonably often...
OWASP Cheat Sheet – DOM based XSS Prevention Introduction When looking at XSS (Cross-Site Scripting), there are three generally recognized forms of XSS: Reflected or Stored DOM Based XSS....
OWASP Cheat Sheet – Abuse Case Introduction Often when the security level of an application is mentioned in requirements, the following expressions are met: The application must be...
OWASP Cheat Sheet – Database Security Introduction This cheat sheet provides guidance on securely configuring and using the SQL and NoSQL databases. It is intended to...
OWASP Cheat Sheet – Access Control Introduction Authorization may be defined as “the process of verifying that a requested action or service is approved for a...
OWASP Cheat Sheet – Denial of Service Introduction This sheet is focused on providing an overall, common overview with an informative, straight to the point guidance to...
OWASP Cheat Sheet – Attack Surface Analysis What is Attack Surface Analysis and Why is it Important This article describes a simple and pragmatic way of doing...
OWASP Cheat Sheet – Deserialization Introduction This article is focused on providing clear, actionable guidance for safely deserializing untrusted data in your applications. What is...
OWASP Cheat Sheet – Authentication Introduction Authentication is the process of verifying that an individual, entity or website is whom it claims to be. Authentication in...