Giter Site home page Giter Site logo

owasp / www-project-top-10-low-code-no-code-security-risks Goto Github PK

View Code? Open in Web Editor NEW
62.0 14.0 23.0 418 KB

OWASP Low-Code/No-Code Top 10

Home Page: https://owasp.org/www-project-top-10-low-code-no-code-security-risks/

License: Other

HTML 90.05% Ruby 9.95%
lowcode nocode cybersecurity infosec security appsec owasp owasp-top-10

www-project-top-10-low-code-no-code-security-risks's Introduction

OWASP Low-Code/No-Code Top 10

OWASP Low-Code/No-Code Top 10

stars twitter slack email group

https://owasp.org/www-project-top-10-low-code-no-code-security-risks/

The primary goal of the "OWASP Low-Code/No-Code Top 10" document is to provide assistance and education for organizations looking to adopt and develop Low-Code/No-Code applications. The guide provides information about what the most prominent security risks are for such applications, the challenges involved, and how to overcome them.

Want to help?

We are always researching, updating the guide, and welcoming contributors to the project.

Read our contributing guidelines here.

www-project-top-10-low-code-no-code-security-risks's People

Contributors

aabashkin avatar andrewsilberman avatar christopherhackett avatar davidyack avatar kingthorin avatar mbrg avatar nekosoft avatar oorryy avatar owaspfoundation avatar rouanw avatar swatantra avatar umair-khokhar avatar y-mehta avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

www-project-top-10-low-code-no-code-security-risks's Issues

Add Example Attack Scenarios

For each of the Top 10 risks, we would like to have a list of concrete attack scenarios where confidentiality, integrity or availability can be compromised.

The descriptions should be technical and one pharagraph long. They could be generic, or focus on a particular low-code/no-code platform.

To contribute, please create a PR.

Grammatical Updates

I have updated all sections of the report with grammatical and syntax updates for better readability.

Revise descriptions

All texts in the repository, from the index.md file to specific risks out of the Top 10 list, are up for review and improvement.

Add descriptions for business users

Context

The language of OWASP documents speaks to security, operations, IT and engineering professionals. The introduction of low-code/no-code has lowered the bar to become a digital builder. This is the root of why this technology is so important. However, it also means that we cannot assume the same level of technical or security accoman from all low-code/no-code developers.

To enable usage of the OWASP Low-Code/No-Code Top 10 by everyone, no matter their technical background, we would need to remove our assumptions and describe risks in a common language that everyone can understand. This should not replace the technical or security oriented language which is a golden standard of an OWASP project, but come as a parallel view on the same issues.

Proposal Description

The current template for a risk category is as follows:

  • Risk Rating
  • The Gist
  • Description
  • Example Attack Scenarios
    • Scenario 1
    • Scenario 2
    • ...
  • How to Prevent
  • References

We propose the following additions:

  • A new section between Risk Rating and The Gist describing the category in simple terms
  • A new subsection for each Scenario describing it in simple terms

Logo issue.

The logo usage here is in violation of the policy:
"Questionable practices include changing the circle to a square, altering the angle of the wasp feature, using non-branded wasp images, copyrighted images, and any other treatment that alters or obscures the OWASP brand. The OWASP Foundation reserves the right to request changes to any graphic that does not comply with these rules."

Please see https://owasp.org/www-policy/operational/branding for more information.

Add product-specific examples

Context

Low-Code/No-Code can mean many different things. Tools can differ in technology, users, developers, use cases and more. For example, Low-Code Application Platforms (LCAP) is used to build web and mobile applications while Robotic Process Automation (RPA) is used to build bots. These technologies are ever-changing and are in the process of merging with eachother, so its still important to cover them in a single project. However, we should also emphasize where they differ, allowing people to focus on the risks relevant to a particular technology.

Proposal Description

The current template for a risk category is as follows:

  • Risk Rating
  • The Gist
  • Description
  • Example Attack Scenarios
    • Scenario 1
    • Scenario 2
    • ...
  • How to Prevent
  • References

We propose the following additions:

  • A new subsection under Risk Rating, where we provide different ratings for each Low-Code development technologies
  • Label each Scenario with the relevant technologies. A scenario can apply to multiple technologies.

Low-Code development technologies to distinguish:

  • Low-Code Application Platforms (LCAP)
  • Robotic Process Automation (RPA)
  • Integration Platform as a Service (iPaaS)

LCNC-SEC-03 - Clarify "unintended consequences"

"Unintended consequences" may be too nebulous, it's coverage is broad and vague. Clarity in the description and impact for what "unintended consequences" means in relation to data leakage is required, or consider a different title.

@mbrg

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.