OWASP / DevGuide

The OWASP Guide
Other
2.04k stars 382 forks source link

Expanding - acquiring secure software #66

Closed angelomaragna closed 7 years ago

angelomaragna commented 7 years ago

This is a skeleton, but functional, for what could be written about each part of the evaluation process whose purpose is to keep the attention on acquiring a secure software. The CISSP reference which I am studying doesn't cover this specific aspect, rather focuses on single elements of a secure development. Hence, I also relied on sources I found online (https://2015.appsec.eu/wp-content/uploads/2015/09/owasp-appseceu2015-sroka.pdf)

bradchesney79 commented 7 years ago

Pushing now... thanks for the reminder @Shredder121