The OWASP top 10 proactive controls

However, have heart, some images do effectively bring strong recall of the information they represent. Of these, not every image will be easy for you to remember. Select images by how well they remind you of the information they represent and the memorability of the images.

OWASP Proactive Controls Lessons

As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques. All tiers of a web application, the user interface, the business logic, the controller, OWASP Proactive Controls Lessons the database code and more – all need to be developed with security in mind. This can be a very difficult task and developers are often set up for failure. Most developers did not learn about secure coding or crypto in school.

Related Projects

Fortunately, image memorability, or how well they stick in your memory, is something that you can improve with practice and innovation. We will go over how to make these images more memorable next. OWASP Top 10 Proactive Controls describes the most important control and control categories that every architect and developer should absolutely, 100% include in every project.

  • Continue to imagine the choir singing sounding like the foghorn with the defined abs with the security guards chasing them smashing through the door.
  • This document will also provide a good foundation of topics to help drive introductory software security developer training.
  • Logically it doesn’t make sense, but you’re going to remember it because that’s a memorable reason.
  • Most developers did not learn about secure coding or crypto in school.

First, you use your imagination to come up with mental imagery and sensations that would remind you of the information in some way. One of the main goals of this document is to provide concrete practical guidance that helps developers build secure software. These techniques should be applied proactively at the early stages of software development to ensure maximum effectiveness.

OWASP Proactive Control 6 — implement digital identity

The method of loci, a.k.a. “The Journey Method,” is the mnemonic strategy we will use. The method of loci, also known as the journey method, is a mental filing cabinet that keeps the information you want to remember. It is a spatial memory technique that has been used for thousands of years to memorize volumes of information. I’ve successfully this method to memorize over one thousand digits of Pi for Pi Day.

The point is that this is a story that puts meaning to the placement of the image on the location. Logically it doesn’t make sense, but you’re going to remember it because that’s a memorable reason. Smash the choir singer through the door with a loud bang, busting open the door, seeing splinters flying everywhere. See the security guards flying through the doors after her. Continue to imagine the choir singing sounding like the foghorn with the defined abs with the security guards chasing them smashing through the door. Imagine the choir singer coming to the door smashing some of it through the door like the Kool-Aid guy!

Link to the OWASP Top 10 Project¶

Tall dressers you can knock over, leap on or leap off, come out of the shelves, bookshelves can have books knocked off. Closet doors can swing open and shut quickly, and you can smash through them. REV-up the placement of each image on your journey location. I could tell you that software is one of the most significant attack vectors. I could also tell you that most software has been built with security as an afterthought.

Here’s an example of talking in an image into a place using the first journey location (the bedroom door) and the choir singer. Imagine the choir singer busting through the door because she was escaping the security guards. They were trying to stop her from cheating on her diet because they are the “diet police.” Diet police? It does when you remember that she had defined abdominals which means she must be on a strict diet, right?

Step 3: Describe why the image is at the location

Whatever story you come up with to stick the image onto the location works as long as it is memorable. When placing images on a mirror, you can smash them on the mirror, break the mirror, see the image in the mirror. When putting images on a dresser, you can see the images flying out of the drawers you can see the images smashing into it like a meteor flying out of the sky. Windows you can break through, jump through, or crash through. For a lamp, you can knock it over, smash it, materialize from the light. A side table you can sit on, you can emerge from, you can tip over.

OWASP Proactive Controls Lessons

Leave a Comment

Your email address will not be published. Required fields are marked *