-
Notifications
You must be signed in to change notification settings - Fork 70
/
mkdocs.yml
151 lines (146 loc) · 8.04 KB
/
mkdocs.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
site_name: "OWASP Top 10 Proactive Controls"
site_url: https://top10proactive.owasp.org
repo_url: https://github.com/OWASP/www-project-proactive-controls/
theme:
name: material
custom_dir: overrides
static_templates:
- 404.html
- google6fbf6cc04efaa5b5.html
features:
- navigation.indexes
- navigation.sections
- navigation.tracking
- navigation.path
- navigation.tabs
- navigation.top
- search.suggest
- search.highlight
- content.tabs.link
- content.code.annotation
- content.code.copy
language: en
palette:
- scheme: default
toggle:
icon: material/toggle-switch-off-outline
name: Switch to dark mode
primary: teal
accent: purple
- scheme: slate
toggle:
icon: material/toggle-switch
name: Switch to light mode
primary: teal
accent: lime
markdown_extensions:
- admonition
- pymdownx.details
- pymdownx.highlight:
anchor_linenums: true
line_spans: __span
pygments_lang_class: true
- pymdownx.inlinehilite
- pymdownx.snippets
- pymdownx.superfences
extra:
social:
- icon: fontawesome/brands/github-alt
link: https://github.com/OWASP/www-project-proactive-controls
analytics:
provider: google
property: G-7YFX9CCX5E
copyright: |
<div style="float: left; padding-right: 1em;">
<a href="https://www.owasp.org"><img src="https://github.com/OWASP/owasp-mastg/blob/master/Document/Images/OWASP_logo_white.png?raw=true" width="100px" /></a>
</div>
<span style="font-size: smaller">
© OWASP Foundation 2024. This work is licensed under
<a href="https://creativecommons.org/licenses/by/4.0">CC-BY-4.0</a>. For any reuse or distribution, you must make clear to others the license terms of this work.
</span><br><span style="font-size: smaller">OWASP ® is a registered trademark of the OWASP Foundation, Inc.</span> <span>This website uses cookies to analyze our traffic and only share that information with our analytics partners. <a href="https://github.com/OWASP/owasp-mastg/blob/master/about_cookies.md">Learn more</a>.</span>
nav:
- 'Future Top 10 (WIP)':
- index.md
- 'In the News': introduction/in-the-news.md
- 'How to contribute?': introduction/contributing.md
- 'About OWASP': introduction/about-owasp.md
- 'Related OWASP Projects': introduction/related-owasp-projects.md
- 'Top 10 Proactive Controls:':
- the-top-10/index.md
- "C1: Implement Access Control": the-top-10/c1-accesscontrol.md
- "C2: Use Cryptography to Protect Data": the-top-10/c2-crypto.md
- "C3: Validate all Input & Handle Exceptions": the-top-10/c3-validate-input-and-handle-exceptions.md
- "C4: Address Security from the Start": the-top-10/c4-secure-architecture.md
- "C5: Secure By Default Configurations": the-top-10/c5-secure-by-default.md
- "C6: Keep your Components Secure": the-top-10/c6-use-secure-dependencies.md
- "C7: Secure Digital Identities": the-top-10/c7-secure-digital-identities.md
- "C8: Leverage Browser Security Features": the-top-10/c8-leverage-browser-security-features.md
- "C9: Implement Security Logging and Monitoring": the-top-10/c9-security-logging-and-monitoring.md
- "C10: Stop Server Side Request Forgery": the-top-10/c10-stop-server-side-request-forgery.md
- 'Final Word': final-word.md
- 'Top 10 2024':
- archive/2024/index.md
- 'In the News': archive/2024/introduction/in-the-news.md
- 'How to contribute?': archive/2024/introduction/contributing.md
- 'About OWASP': archive/2024/introduction/about-owasp.md
- 'Related OWASP Projects': archive/2024/introduction/related-owasp-projects.md
- 'Top 10 Proactive Controls:':
- archive/2024/the-top-10/index.md
- "C1: Implement Access Control": archive/2024/the-top-10/c1-accesscontrol.md
- "C2: Use Cryptography to Protect Data": archive/2024/the-top-10/c2-crypto.md
- "C3: Validate all Input & Handle Exceptions": archive/2024/the-top-10/c3-validate-input-and-handle-exceptions.md
- "C4: Address Security from the Start": archive/2024/the-top-10/c4-secure-architecture.md
- "C5: Secure By Default Configurations": archive/2024/the-top-10/c5-secure-by-default.md
- "C6: Keep your Components Secure": archive/2024/the-top-10/c6-use-secure-dependencies.md
- "C7: Secure Digital Identities": archive/2024/the-top-10/c7-secure-digital-identities.md
- "C8: Leverage Browser Security Features": archive/2024/the-top-10/c8-leverage-browser-security-features.md
- "C9: Implement Security Logging and Monitoring": archive/2024/the-top-10/c9-security-logging-and-monitoring.md
- "C10: Stop Server Side Request Forgery": archive/2024/the-top-10/c10-stop-server-side-request-forgery.md
- 'Final Word': archive/2024/final-word.md
- 'Top 10 2018':
- 'About Project': archive/2018/0x02-about-project.md
- 'Translations': archive/2018/translations.md
- 'About OWASP': archive/2018/0x01-about-owasp.md
- 'About Structure': archive/2018/0x03-about-structure.md
- 'Introduction': archive/2018/0x04-introduction.md
- 'C1: Define Security Requirements': archive/2018/c1-security-requirements.md
- 'C2: Leverage Security Frameworks and Libraries': archive/2018/c2-leverage-security-frameworks-libraries.md
- 'C3: Secure Database Access': archive/2018/c3-secure-database.md
- 'C4: Encode and Escape Data': archive/2018/c4-encode-escape-data.md
- 'C5: Validate All Inputs': archive/2018/c5-validate-inputs.md
- 'C6: Implement Digital Identity': archive/2018/c6-digital-identity.md
- 'C7: Enforce Access Controls': archive/2018/c7-enforce-access-controls.md
- 'C8: Protect Data Everywhere': archive/2018/c8-protect-data-everywhere.md
- 'C9: Implement Security Logging and Monitoring': archive/2018/c9-security-logging.md
- 'C10: Handle All Errors and Exceptions': archive/2018/c10-errors-exceptions.md
- 'Final Word': archive/2018/final-word.md
- 'Top 10 2016': archive/2016/index.md
- 'Top 10 2014': archive/2014/index.md
plugins:
- search
- redirects:
redirect_maps:
'v4/en/introduction.md': 'index.md'
'v4/en/0x02-about-project.md': 'index.md'
'v4/en/0x03-about-structure.md': 'the-top-10/index.md'
'v4/en/c1-accesscontrol.md': 'the-top-10/c1-accesscontrol.md'
'v4/en/c2-crypto.md': 'the-top-10/c2-crypto.md'
'v4/en/c3-validate-input-and-handle-exceptions.md': 'the-top-10/c3-validate-input-and-handle-exceptions.md'
'v4/en/c4-secure-architecture.md': 'the-top-10/c4-secure-architecture.md'
'v4/en/c5-secure-by-default.md': 'the-top-10/c5-secure-by-default.md'
'v4/en/c6-use-secure-dependencies.md': 'the-top-10/c6-use-secure-dependencies.md'
'v4/en/c7-implement-digital-identity.md': 'the-top-10/c7-secure-digital-identities.md'
'v4/en/c8-help-the-browser-defend-the-user.md': 'the-top-10/c8-leverage-browser-security-features.md'
'v4/en/c9-security-logging-and-monitoring.md': 'the-top-10/c9-security-logging-and-monitoring.md'
'v4/en/c10-stop-server-side-request-forgery.md': 'the-top-10/c10-stop-server-side-request-forgery.md'
'v3/en/0x04-introduction.md': 'archive/2018/0x04-introduction.md'
'v3/en/c1-security-requirements.md': 'archive/2018/c1-security-requirements.md'
'v3/en/c2-leverage-security-frameworks-libraries.md': 'archive/2018/c2-leverage-security-frameworks-libraries.md'
'v3/en/c3-secure-database.md': 'archive/2018/c3-secure-database.md'
'v3/en/c5-validate-inputs.md': 'archive/2018/c5-validate-inputs.md'
'v3/en/c6-digital-identity.md': 'archive/2018/c6-digital-identity.md'
'v3/en/c7-enforce-access-controls.md': 'archive/2018/c7-enforce-access-controls.md'
'v3/en/c8-protect-data-everywhere.md': 'archive/2018/c8-protect-data-everywhere.md'
'v3/en/c9-security-logging.md': 'archive/2018/c9-security-logging.md'
'v3/en/c10-errors-exceptions.md': 'archive/2018/c10-errors-exceptions.md'
'the-top-10/c8-help-the-browser-defend-the-user.md': 'the-top-10/c8-leverage-browser-security-features.md'