Skip to content

Commit 301db54

Browse files
committed
feat(next-devs): Add reference to OWASP DevSlop Pixi Module
OWASP DevSlop Pixi Module is best suited for API security training. * Remove NodeGoat and JuiceShop references * Add DevSlop Pixi Module reference
1 parent d36df52 commit 301db54

File tree

3 files changed

+16
-17
lines changed

3 files changed

+16
-17
lines changed
45 Bytes
Binary file not shown.
53 Bytes
Binary file not shown.

2019/en/src/0xb0-next-devs.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -15,24 +15,23 @@ comprehensive list of available projects.
1515

1616
| | |
1717
|-|-|
18-
| **Education** | You can start reading [OWASP Education Project materials][2] according to your profession and interest. For hands-on learning, we added **crAPI** - **C**ompletely **R**idiculous **API** on [our roadmap][3]. Meanwhile, you can practice WebAppSec using the [OWASP NodeJS Goat][4], [OWASP Juice Shop Project][5], or any other of the available goat projects. You can also attend [OWASP AppSec Conference][6] training sessions, or [join your local chapter][7]. |
19-
| **Security Requirements** | Security should be part of every project from the beginning. When doing requirements elicitation, it is important to define what "secure" means for that project. OWASP recommends you use the [OWASP Application Security Verification Standard (ASVS)][8] as a guide for setting the security requirements. If you're outsourcing, consider the [OWASP Secure Software Contract Annex][9], which should be adapted according to local law and regulations. |
20-
| **Security Architecture** | Security should remain a concern during all the project stages. The [OWASP Prevention Cheat Sheets][10] are a good starting point for guidance on how to design security in during the architecture phase. Among many others, you'll find the [REST Security Cheat Sheet][11] and the [REST Assessment Cheat Sheet][12]. |
21-
| **Standard Security Controls** | Adopting Standard Security Controls reduces the risk of introducing security weaknesses while writing your own logic. Despite the fact that many modern frameworks now come with built-in standard effective controls, [OWASP Proactive Controls][13] gives you a good overview of what security controls you should look to include in your project. OWASP also provides some libraries and tools you may find valuable, such as validation controls. |
22-
| **Secure Software Development Life Cycle** | You can use the [OWASP Software Assurance Maturity Model (SAMM)][14] to improve the process when building APIs. Several other OWASP projects are available to help you during the different API development phase,s e.g., the [OWASP Code Review Project][15]. |
18+
| **Education** | You can start reading [OWASP Education Project materials][2] according to your profession and interest. For hands-on learning, we added **crAPI** - **C**ompletely **R**idiculous **API** on [our roadmap][3]. Meanwhile, you can practice WebAppSec using the [OWASP DevSlop Pixi Module][4], a vulnerable WebApp and API service intent to teach users how to test modern web applications and API's for security issues, and how to write more secure API's in the future. You can also attend [OWASP AppSec Conference][5] training sessions, or [join your local chapter][6]. |
19+
| **Security Requirements** | Security should be part of every project from the beginning. When doing requirements elicitation, it is important to define what "secure" means for that project. OWASP recommends you use the [OWASP Application Security Verification Standard (ASVS)][7] as a guide for setting the security requirements. If you're outsourcing, consider the [OWASP Secure Software Contract Annex][8], which should be adapted according to local law and regulations. |
20+
| **Security Architecture** | Security should remain a concern during all the project stages. The [OWASP Prevention Cheat Sheets][9] are a good starting point for guidance on how to design security in during the architecture phase. Among many others, you'll find the [REST Security Cheat Sheet][10] and the [REST Assessment Cheat Sheet][11]. |
21+
| **Standard Security Controls** | Adopting Standard Security Controls reduces the risk of introducing security weaknesses while writing your own logic. Despite the fact that many modern frameworks now come with built-in standard effective controls, [OWASP Proactive Controls][12] gives you a good overview of what security controls you should look to include in your project. OWASP also provides some libraries and tools you may find valuable, such as validation controls. |
22+
| **Secure Software Development Life Cycle** | You can use the [OWASP Software Assurance Maturity Model (SAMM)][13] to improve the process when building APIs. Several other OWASP projects are available to help you during the different API development phase,s e.g., the [OWASP Code Review Project][14]. |
2323

2424
[1]: https://www.owasp.org/index.php/Category:OWASP_Project
2525
[2]: https://www.owasp.org/index.php/OWASP_Education_Material_Categorized
2626
[3]: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Road_Map
27-
[4]: https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project
28-
[5]: https://www.owasp.org/index.php/OWASP_Juice_Shop_Project
29-
[6]: https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference
30-
[7]: https://www.owasp.org/index.php/OWASP_Chapter
31-
[8]: https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
32-
[9]: https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex
33-
[10]: https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series
34-
[11]: https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/REST_Security_Cheat_Sheet.md
35-
[12]: https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/REST_Assessment_Cheat_Sheet.md
36-
[13]: https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=OWASP_Proactive_Controls_2018
37-
[14]: https://www.owasp.org/index.php/OWASP_SAMM_Project
38-
[15]: https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project
27+
[4]: https://devslop.co/Home/Pixi
28+
[5]: https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference
29+
[6]: https://www.owasp.org/index.php/OWASP_Chapter
30+
[7]: https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
31+
[8]: https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex
32+
[9]: https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series
33+
[10]: https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/REST_Security_Cheat_Sheet.md
34+
[11]: https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/REST_Assessment_Cheat_Sheet.md
35+
[12]: https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=OWASP_Proactive_Controls_2018
36+
[13]: https://www.owasp.org/index.php/OWASP_SAMM_Project
37+
[14]: https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project

0 commit comments

Comments
 (0)