OWASP Cheat Sheet – Injection Prevention in Java Introduction This document has for objective to provide some tips to handle Injection into Java application code. Sample codes used in tips...
OWASP Cheat Sheet – Input Validation Introduction This article is focused on providing clear, simple, actionable guidance for providing Input Validation security functionality in your applications....
OWASP Cheat Sheet – Insecure Direct Object Reference Prevention Introduction Insecure Direct Object Reference (called IDOR from here) occurs when a application exposes a reference to an internal implementation object. Using this way, it...
OWASP Cheat Sheet – JAAS Introduction – What is JAAS authentication The process of verifying the identity of a user or another system is authentication....
OWASP Cheat Sheet – JSON Web Token for Java Introduction Many applications use JSON Web Tokens (JWT) to allow the client to indicate its identity for further exchange after authentication. From JWT.IO:...
OWASP Cheat Sheet – Docker Security Introduction Docker is the most popular containerization technology. Upon proper use, it can increase the level of security (in comparison...
OWASP Cheat Sheet – Key Management Introduction This Key Management Cheat Sheet provides developers with guidance for implementation of cryptographic key management within an application in...
OWASP Cheat Sheet – DotNet Security Introduction This page intends to provide quick basic .NET security tips for developers. The .NET Framework The .NET Framework is...
OWASP Cheat Sheet – Kubernetes Security Kubernetes Kubernetes is an open source container orchestration engine for automating deployment, scaling, and management of containerized applications. The open...
OWASP Cheat Sheet – Error Handling Introduction Error handling is a part of the overall security of an application. Except in movies, an attack always begins...