Conversation
|
This guide looks great. Thanks so much, Rishi! |
| For developers of APIs, Web Applications, and CI/CD pipelines, we recommend ensuring you review the following resources prior to releasing your code. | ||
|
|
||
| 1. **Review [OWASP Top 10 API Security Risks - 2023](https://owasp.org/API-Security/editions/2023/en/0x11-t10/)**: Understand and mitigate the top API security risks for the current year. | ||
|
|
There was a problem hiding this comment.
I would consider adding a link to CISA's Secure-by-Design/Default initiative. They've produced a guide.
IEEE Computer Society also provides a number of recommendations that promote using OWASP.
NIST also published a Secure Software Development Framework (SSDF) standard.
There was a problem hiding this comment.
Thanks @jpl-jengelke! @anrucker - what are your thoughts on the above recommendations? Should we include or do you feel your original list already covers the above?
There was a problem hiding this comment.
Could it be "Review updated security guidance from industry-leading experts, such as ..." and then include additional resources?
|
Thinking more about this guide, I'm wondering if we can make the following changes (CC @jpl-jengelke @anrucker):
|
True regarding the observation of a broad topic but it is an area of cybersecurity focus. Recently, the focus has been on implementing shift-left strategies that more tightly integrate development very early on with DevSecOps. |
I'd endorse option two since I think the project can offer a range of recommendations, and I think this may best serve as implementation guidance. We could also refer users to the #148 product for implementation. |
I like option 2 as well. Keeps the focus of this guide simple and we can cross link to a separate guide on tools. If there's specific or common CVEs then we could also offer specific invocations to SCRUB or other tools to check for those CVEs. |
|



Purpose
Proposed Changes
Issues
Testing