Zusammenfassung
HÃufig genutzt, oft unpassend verwendet: Die OWASP Top 10 – ,,das‘‘ – Dokument rund um Webanwendungssicherheit. Der Beitrag zeigt auf, warum manche Verwendung nicht sinnvoll, was besser geeignet und warum die Top 10 dennoch zu Recht so erfolgreich sind.
Literatur
OWASP German Chapter: owasp.de
German OWASP Day: god.owasp.de
OWASP Top 10: https://owasp.org/www-project-top-ten/
OWASP Web Security Testing Guide (WSTG): https://owasp.org/www-project-web-security-testing-guide/
OWASP Software Assurance Security Modell (SAMM): https://owaspsamm.org/
OWASP Application Security Verification Standard (ASVS): https://owasp.org/www-project-application-security-verification-standard/
Common Weakness Enumeration Database (CWE): https://cwe.mitre.org/
Common Vulnerability Scoring System (CVSS): https://www.first.org/cvss/v3-1/
Common Vulnerabilities and Exposures (CVE): https://cve.mitre.org/
How to use the OWASP Top 10 as a standard: https://owasp.org/Top10/A00_2021_How_to_use_the_OWASP_Top_10_as_a_standard
Zerforschung: https://zerforschung.org/posts/doczirkus/
Damn Vulnerable Web Service: https://github.com/snoopysecurity/dvws
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Glemser, T. OWASP Top 10. Datenschutz Datensich 46, 695–698 (2022). https://doi.org/10.1007/s11623-022-1685-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-022-1685-5