The OWASP Secure Coding Practices Quick-reference Guide is being extensively rewritten to follow the [OWASP Top 10 Proactive Controls][controls]:
- C1: Define Security Requirements
- C2: Leverage Security Frameworks and Libraries
- C3: Secure Database Access
- C4: Encode and Escape Data
- C5: Validate All Inputs
- C6: Implement Digital Identity
- C7: Enforce Access Controls
- C8: Protect Data Everywhere
- C9: Implement Security Logging and Monitoring
- C10: Handle All Errors and Exceptions
This project will then be migrated to the OWASP Developer Guide. Contact Jon Gadsden for any questions about this move.
This repo is the source for the OWASP SCP project web pages. The content was migrated from the original OWASP SCP wiki page.