Table of contents
What is OWASP?
What are OWASP and the OWASP Foundation?
The OWASP Foundation, Inc. is a United States 501(c)3 nonprofit charity governed by a Global Board and administered by its executive director, staff, and contractors. It was founded in 2004 and functions as the governing body of OWASP, which comprises the infrastructure, community, and projects. The Foundation ensures that the community’s projects and activities are sustainable and aligned with its mission.
OWASP was founded in 2001 as the Open Web Application Security Project, with a mission to make application security visible so that organizations could make informed decisions about application security risks. This initiative aimed to address the lack of comprehensive, vendor-neutral information on web application security available at the time. OWASP published the first edition of the OWASP Top Ten in 2003. This document identified the ten most critical web application security risks plus information on how to mitigate these risks. Other organizations like MITRE and the United States Federal Trade Commission (FTC) quickly recognized this document as an industry standard.
Other early accomplishments include the OWASP Development Guide, which provided guidance on secure coding practices, and the OWASP Testing Guide, which offered a comprehensive framework for penetration testing. From 2006 to 2015, OWASP continued to publish updated versions of these guides and added new projects like Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), the Open Software Assurance Maturity Model (SAMM), the Mobile Security Project, and many more.
Since 2016, OWASP has published additional Top Ten documents, including the Mobile Top Ten and API Security Top Ten. Work has continued on earlier projects, and the organization has intensified efforts to recruit new members and increase their global events.
OWASP originally stood for the Open Web Application Security Project. The Board voted to change the “W” from “Web” to “Worldwide” in early 2023 to reflect the organization’s expansion into other types of work.
What does OWASP do?
OWASP is home to hundreds of projects, but it has only four primary functions:
- Education and awareness: OWASP provides educational resources, conducts training sessions, and organizes workshops to raise awareness about application security. The community also publishes research and documentation to help developers and security professionals follow best practices and avoid common vulnerabilities.
- Tool development: Open-source tools like OWASP Dependency-Check, Zed Attack Proxy (ZAP), and WebGoat help companies identify and prevent application vulnerabilities.
- Community building: Global conferences and local chapters allow members to share knowledge, brainstorm, and collaborate on projects or other work.
- Standards and best practices: OWASP creates and promotes security standards, frameworks, guidelines, and policies to help companies fully secure their resources.
OWASP projects
Projects are community-driven initiatives to improve software security in a specific way. OWASP categorizes projects into several types, including Flagship projects, tools, documentation, and more. Below are some OWASP Flagship projects that have demonstrated strategic value to application security:
- OWASP Top Ten: A regularly updated report that outlines the ten most critical web application security risks
- OWASP Zed Attack Proxy (ZAP): An open-source web application security scanner
- OWASP Security Knowledge Framework (SKF): A tool that helps developers understand and implement secure coding practices
- OWASP Cheat Sheet Series: A collection of concise guides on various application security topics
Production projects are production-ready but have not reached the same level of maturity or adoption as Flagship projects. Some examples:
- OWASP API Security Project: Like the OWASP Top Ten, but for API security rather than application security
- OWASP CSRFGuard: A library designed to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks
- OWASP ModSecurity: The standard open-source web application firewall (WAF) engine
There are far too many OWASP projects to list here. The OWASP Foundation provides the resources and infrastructure to ensure the success of OWASP projects.
Who uses OWASP products?
Audience
|
OWASP Product
|
Description
|
---|---|---|
Developers
|
OWASP Top Ten
|
Provides developers with a list of the most critical security risks, guiding them to write more secure code
|
OWASP Cheat Sheet Series
|
Offers concise, practical security tips and best practices that developers can easily integrate into their workflows
|
|
OWASP ZAP (Zed Attack Proxy)
|
An easy-to-use tool that developers can use to test the security of their applications during development
|
|
Security professionals
|
OWASP Top Ten
|
Serves as a baseline for security assessments and vulnerability management
|
OWASP ASVS (Application Security Verification Standard)
|
A framework for security testing, providing security professionals with a comprehensive checklist for assessing application security
|
|
OWASP Dependency-Check
|
Helps security professionals identify vulnerabilities in third-party libraries and components
|
|
Organizations/enterprises
|
OWASP SAMM (Software Assurance Maturity Model)
|
Provides a framework for organizations to evaluate and improve their software security practices
|
OWASP Top Ten
|
Often used by organizations to set security policies and standards for their development teams
|
|
OWASP Risk Rating Methodology
|
Assists organizations in assessing the severity of vulnerabilities and prioritizing remediation efforts
|
|
Educational institutions
|
OWASP Top Ten
|
Used in curricula to teach students about common security vulnerabilities and mitigation strategies
|
OWASP WebGoat
|
An educational tool that allows students to learn about web security by exploiting and fixing vulnerabilities in a controlled environment
|
|
OWASP Juice Shop
|
Another educational project providing a vulnerable web application for students to practice their security skills
|
|
Regulators/compliance
|
OWASP Top Ten
|
Referenced by many regulatory standards and compliance frameworks as a guideline for web application security
|
OWASP ASVS
|
Provides detailed security requirements that can achieve compliance with various regulations
|
Learn more about OWASP
Related terms
- OWASP Top Ten
- API Security
- Cross-Site Scripting (XSS)
- Cross Site Request Forgery (CSRF)
- Distributed Denial of Service (DDoS)
- SQL Injection
- Web Application Security
- Web Application and API Protection (WAAP)
Further reading
- Threat Spotlight: How attackers are targeting your web applications right now
- Threat Spotlight: Web apps under active threat from 10-year-old Shellshock bugs and miners
- Threat Spotlight: How bad bot traffic is changing
- Shadows, zombies, and Twilio’s wide-open API
- Barracuda OWASP Security Projects blog
- Dell: 49 million customer records exposed in 1 automated attack
- OWASP Website
How Barracuda can help
Barracuda offers complete application protection and the industry’s most comprehensive cybersecurity platform that defends all attack vectors with real-time threat intelligence and incident response. Barracuda offers best value, feature-rich, one-stop solutions that protect against a wide range of threat vectors and are backed up by complete, award-winning customer service. Because you are working with one vendor, you benefit from reduced complexity, increased effectiveness, and lower total cost of ownership. Hudreds of thousands of customers worldwide count on Barracuda to protect their email, networks, applications, and data.