OWASP Cheat Sheet – Authorization Introduction Authorization may be defined as “the process of verifying that a requested action or service is approved for a...
OWASP Cheat Sheet – Authorization Testing Automation Introduction Authorizations definition and implementation is one of the important protection measures of an application. They are defined in...
OWASP Cheat Sheet – Bean Validation Introduction This article is focused on providing clear, simple, actionable guidance for providing Java Bean Validation security functionality in your...
OWASP Cheat Sheet – C-Based Toolchain Hardening Introduction C-Based Toolchain Hardening is a treatment of project settings that will help you deliver reliable and secure code when...
OWASP Cheat Sheet – Choosing and Using Security Questions Introduction WARNING: Security questions are no longer recognized as an acceptable authentication factor per NIST SP 800-63. Account recovery is just...
OWASP Cheat Sheet – Clickjacking Defense Introduction This cheat sheet is intended to provide guidance for developers on how to defend against Clickjacking, also known as UI...
OWASP Cheat Sheet – Content Security Policy Introduction This article brings forth a way to integrate the defense in depth concept to the client-side of web applications. By injecting...
OWASP Cheat Sheet – Credential Stuffing Prevention Introduction This cheatsheet covers defences against two common types of authentication-related attacks: credential stuffing and password spraying. Although these are...
OWASP Cheat Sheet – Cross-Site Request Forgery Prevention Introduction Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message,...
OWASP Cheat Sheet – Cross Site Scripting Prevention Introduction This cheat sheet provides guidance to prevent XSS vulnerabilities. Cross-Site Scripting (XSS) is a misnomer. The name originated from...