|
1 | | -# What's Next For Developers |
| 1 | +# O Que Se Segue Para Programadores |
2 | 2 |
|
3 | | -The task to create and maintain secure applications, or fixing existing |
4 | | -applications, can be difficult. It is no different for APIs. |
| 3 | +A tarefa de criar e manter aplicações seguras, ou corrigir aplicações |
| 4 | +existentes, pode ser difícil. Não é diferente para as APIs. |
5 | 5 |
|
6 | | -We believe that education and awareness are key factors to writing secure |
7 | | -software. Everything else required to accomplish the goal depends on |
8 | | -**establishing and using repeatable security processes and standard security |
9 | | -controls**. |
| 6 | +Acreditamos que educação e consciencialização são fatores chave para o |
| 7 | +desenvolvimento de software seguro. Tudo o mais necessário para alcançar este |
| 8 | +objetivo depende da **definição e utilização de processos de segurança |
| 9 | +reprodutíveis e do uso de controlos de segurança _standard_**. |
10 | 10 |
|
11 | | -OWASP provides numerous free and open resources to help you address security. |
12 | | -Please visit the [OWASP Projects page][1] for a comprehensive list of available |
13 | | -projects. |
| 11 | +A OWASP disponibiliza uma grande quantidade de recursos gratuitos e abertos para |
| 12 | +abordar a segurança. Por favor visite a [página dos projetos OWASP][1] para |
| 13 | +consulta da lista dos projetos existentes. |
14 | 14 |
|
15 | 15 | | | | |
16 | 16 | |-|-| |
17 | | -| **Education** | The [Application Security Wayfinder][2] should give you a good idea about what projects are available for each stage/phase of the Software Development LifeCycle (SDLC). For hands-on learning/training you can start with [OWASP **crAPI** - **C**ompletely **R**idiculous **API**][3] or [OWASP Juice Shop][4]: both have intentionally vulnerable APIs. The [OWASP Vulnerable Web Applications Directory Project][5] provides a curated list of intentionally vulnerable applications: you'll find there several other vulnerable APIs. You can also attend [OWASP AppSec Conference][6] training sessions, or [join your local chapter][7]. | |
18 | | -| **Security Requirements** | Security should be part of every project from the beginning. When defining requirements, it is important to define what "secure" means for that project. OWASP recommends you use the [OWASP Application Security Verification Standard (ASVS)][8] as a guide for setting the security requirements. If you're outsourcing, consider the [OWASP Secure Software Contract Annex][9], which should be adapted according to local law and regulations. | |
19 | | -| **Security Architecture** | Security should remain a concern during all the project stages. The [OWASP Cheat Sheet Series][10] is a good starting point for guidance on how to design security in during the architecture phase. Among many others, you'll find the [REST Security Cheat Sheet][11] and the [REST Assessment Cheat Sheet][12] as well the [GraphQL Cheat Sheet][13]. | |
20 | | -| **Standard Security Controls** | Adopting standard security controls reduces the risk of introducing security weaknesses while writing your own logic. Although many modern frameworks now come with effective built-in standard controls, [OWASP Proactive Controls][14] gives you a good overview of what security controls you should look to include in your project. OWASP also provides some libraries and tools you may find valuable, such as validation controls. | |
21 | | -| **Secure Software Development Life Cycle** | You can use the [OWASP Software Assurance Maturity Model (SAMM)][15] to improve your processes of building APIs. Several other OWASP projects are available to help you during the different API development phases e.g., the [OWASP Code Review Guide][16]. | |
| 17 | +| **Educação** | The [Application Security Wayfinder][2] should give you a good idea about what projects are available for each stage/phase of the Software Development LifeCycle (SDLC). For hands-on learning/training you can start with [OWASP **crAPI** - **C**ompletely **R**idiculous **API**][3] or [OWASP Juice Shop][4]: both have intentionally vulnerable APIs. The [OWASP Vulnerable Web Applications Directory Project][5] provides a curated list of intentionally vulnerable applications: you'll find there several other vulnerable APIs. You can also attend [OWASP AppSec Conference][6] training sessions, or [join your local chapter][7]. | |
| 18 | +| **Requisitos de Segurança** | Security should be part of every project from the beginning. When defining requirements, it is important to define what "secure" means for that project. OWASP recommends you use the [OWASP Application Security Verification Standard (ASVS)][8] as a guide for setting the security requirements. If you're outsourcing, consider the [OWASP Secure Software Contract Annex][9], which should be adapted according to local law and regulations. | |
| 19 | +| **Arquitetura de Segurança** | Security should remain a concern during all the project stages. The [OWASP Cheat Sheet Series][10] is a good starting point for guidance on how to design security in during the architecture phase. Among many others, you'll find the [REST Security Cheat Sheet][11] and the [REST Assessment Cheat Sheet][12] as well the [GraphQL Cheat Sheet][13]. | |
| 20 | +| **Controlos Standard de Segurança** | Adopting standard security controls reduces the risk of introducing security weaknesses while writing your own logic. Although many modern frameworks now come with effective built-in standard controls, [OWASP Proactive Controls][14] gives you a good overview of what security controls you should look to include in your project. OWASP also provides some libraries and tools you may find valuable, such as validation controls. | |
| 21 | +| **Ciclo de Desenvolvimento de Software Seguro** | You can use the [OWASP Software Assurance Maturity Model (SAMM)][15] to improve your processes of building APIs. Several other OWASP projects are available to help you during the different API development phases e.g., the [OWASP Code Review Guide][16]. | |
22 | 22 |
|
23 | 23 | [1]: https://owasp.org/projects/ |
24 | 24 | [2]: https://owasp.org/projects/#owasp-projects-the-sdlc-and-the-security-wayfinder |
|
0 commit comments