ðµOWASPïŒãªãŒã¯ã¹ãïŒ
OWASP Top TenïŒ ããã 10ãã¯ã2003 幎ã«åããŠå
¬è¡šãããå®æçã«æŽæ°ãããŠããŸã[13]ãçµç¹ãçŽé¢ããæãé倧ãªãªã¹ã¯ã®ããã€ããç¹å®ããããšã«ãã£ãŠãã¢ããªã±ãŒã·ã§ ã³ã»ã»ãã¥ãªãã£ã«å¯Ÿããæèãé«ããããšãç®çãšããŠããŸã[14][15][16]ãå€ãã®æšæºãæžç±ãããŒã«ããããŠãMITREãPCI DSSã[17]åœé²æ
å ±ã·ã¹ãã å±ïŒDISA-STIGïŒãç±³åœé£éŠååŒå§å¡äŒïŒFTCïŒ[18]ãªã©ãå€ãã®çµç¹ããããã 10ããããžã§ã¯ããåç
§ããŠããŸãã
OWASP ãœãããŠã§ã¢ä¿èšŒæç床ã¢ãã«ïŒ ãœãããŠã§ã¢ä¿èšŒæç床ã¢ãã«ïŒSAMMïŒãããžã§ã¯ãã®äœ¿åœã¯ãããããçš®é¡ã®çµç¹ããœãããŠã§ã¢ã»ãã¥ãªãã£æ
å¢ãåæããæ¹åããããã®å¹æçã§æž¬å®å¯èœãªæ¹æ³ãæäŸããããšã§ããããã®äžå¿çãªç®çã¯ãæè»ãªèªå·±è©äŸ¡ã¢ãã«ãéããŠãå®å
šãªãœãããŠã§ã¢ãèšèšãéçºãé
åããæ¹æ³ã«ã€ããŠçµç¹ã®æèãé«ããæè²ããããšã§ãããSAMM ã¯ããœãããŠãšã¢ã®ã©ã€ããµã€ã¯ã«å
šäœããµããŒãããæè¡ãããã»ã¹ã«ãšããããªããSAMM ã¢ãã«ã¯ããã¹ãŠã®çµç¹ã«éçšããåäžã®ã¬ã·ããååšããªãããšãèªèããæ¬è³ªçã«é²åçã§ãªã¹ã¯é§ååã§ããããã«èšèšãããŠãã[19]ã
OWASP éçºã¬ã€ã éçºã¬ã€ãã¯ãå®è·µçãªæåŒããæäŸããJ2EEãASP.NETãPHP ã®ã³ãŒããµã³ãã«ãå«ãã§ãããéçºã¬ã€ãã¯ãSQL ã€ã³ãžã§ã¯ã·ã§ã³ããããã£ãã·ã³ã°ãã¯ã¬ãžããã«ãŒãã®åãæ±ããã»ãã·ã§ã³ã®åºå®åãã¯ãã¹ãµã€ããªã¯ãšã¹ããã©ãŒãžã§ãªãã³ã³ãã©ã€ ã¢ã³ã¹ããã©ã€ãã·ãŒã®åé¡ã®ãããªææ°ã®åé¡ãŸã§ãã¢ããªã±ãŒã·ã§ã³ã¬ãã«ã®ã»ãã¥ãªãã£åé¡ãå¹
åºãã«ããŒããŠããŸãã
OWASP ãã¹ãã¬ã€ã OWASP ãã¹ãã£ã³ã°ã¬ã€ãã¯ããŠãŒã¶ãèªèº«ã®çµç¹ã§å®æœã§ããããã¹ããã©ã¯ãã£ã¹ãã®äŸµå
¥ãã¹ãã®ãã¬ãŒã ã¯ãŒã¯ãšãæãäžè¬çãªãŠã§ãã¢ããªã±ãŒã·ã§ã³ãšãŠã§ããµãŒãã¹ã®ã»ãã¥ãªãã£åé¡ããã¹ãããããã®ææ³ãèšè¿°ãããäœã¬ãã«ãã®äŸµå
¥ãã¹ãã¬ã€ããå«ãã§ããŸãã第 4 çã¯ã60 åã®å人ããã®æèŠãåŸãŠã2014 幎 9 æã«çºè¡ãããŸãã[20]ã
OWASP ã³ãŒãã¬ãã¥ãŒã¬ã€ãïŒ ã³ãŒãã¬ãã¥ãŒã¬ã€ãã¯ãçŸåšãªãªãŒã¹ããŒãžã§ã³ 2.0 ã§ã2017 幎 7 æã«ãªãªãŒã¹ãããã
OWASP ã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£æ€èšŒæšæºïŒASVSïŒïŒ ã¢ããªã±ãŒã·ã§ã³ã¬ãã«ã®ã»ãã¥ãªãã£æ€èšŒãå®æœããããã®æšæº[21]ã
OWASP XML ã»ãã¥ãªãã£ã²ãŒããŠã§ã€ïŒXSGïŒè©äŸ¡åºæºãããžã§ã¯ãã
OWASP ããã 10 ã€ã³ã·ãã³ã察å¿ã¬ã€ãã³ã¹ïŒOWASP Top 10 Incident Response GuidanceïŒããã®ãããžã§ã¯ãã¯ãã€ã³ã·ãã³ã察å¿èšç»ã«å¯Ÿããäºåäºé²çãªã¢ãããŒããæäŸããããã®ææžã®å¯Ÿè±¡èªè
ã«ã¯ãããžãã¹ãªãŒããŒãã»ãã¥ãªãã£ãšã³ãžãã¢ãéçºè
ãç£æ»ãããã°ã©ã ãããžã£ãŒãæ³å·è¡æ©é¢åã³æ³åå±ãå«ãŸãã[23]ã
OWASP ZAP ãããžã§ã¯ãïŒ Zed Attack ProxyïŒZAPïŒã¯ããŠã§ãã¢ããªã±ãŒã·ã§ã³ã®è匱æ§ãçºèŠããããã®ã䜿ããããçµ±å䟵å
¥ãã¹ãããŒã«ã§ãã䟵å
¥ãã¹ãã«æ
£ããŠããªãéçºè
ãæ©èœãã¹ãæ
åœè
ãªã©ãå¹
åºãã»ãã¥ãªãã£çµéšãæã€äººã䜿ããããã«èšèšãããŠããŸãã
Webgoat: å®å
šãªããã°ã©ãã³ã°ã®å®è·µã®ããã®ã¬ã€ããšããŠãOWASP ã«ãã£ãŠäœæãããæå³çã«å®å
šã§ãªããŠã§ãã¢ããªã±ãŒã·ã§ã³ã§ã[1] ã
OWASP AppSec ãã€ãã©ã€ã³ïŒ ã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£ïŒAppSecïŒå
ç¢ãªDevOpsãã€ãã©ã€ã³ãããžã§ã¯ãã¯ãã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£ããã°ã©ã ã®ã¹ããŒããšèªååãé«ããããã«å¿
èŠãªæ
å ±ãèŠã€ããå Žæã§ããAppSec ãã€ãã©ã€ã³ã¯ãDevOps ãšãªãŒã³ã®ååãåãå
¥ããã¢ããªã±ãŒã·ã§ã³ã»ãã¥ãªãã£ããã°ã©ã ã«é©çšããŸãã
OWASP Automated Threats to Web ApplicationsïŒ 2015幎7æçºè¡[25] - OWASP Automated Threats to Web Applications Projectã¯ãã¢ãŒããã¯ããéçºè
ããã¹ãæ
åœè
ããã®ä»ããã¯ã¬ãã³ã·ã£ã«ã»ã¹ã¿ããã£ã³ã°ãªã©ã®èªååãããè
åšãé²åŸ¡ããã®ã«åœ¹ç«ã€ã決å®çãªæ
å ±ãšãã®ä»ã®ãªãœãŒã¹ãæäŸããããšãç®çãšããŠããŸãããã®ãããžã§ã¯ãã¯ãOWASP ã«ãã£ãŠå®çŸ©ãããèªååãããè
åšã®ããã 20 ã®æŠèŠã瀺ããŠãã[26]ã
OWASP API Security ProjectïŒApplication Programming InterfacesïŒAPIïŒç¹æã®è匱æ§ãšã»ãã¥ãªãã£[27]ãªã¹ã¯ãç解ããç·©åããããã®æŠç¥ãšè§£æ±ºçã«çŠç¹ãåœãŠãŠãããææ°ã®ãªã¹ããAPI Security Top 10 2019ããå«ã[28]ã