Answer the question
In order to leave comments, you need to log in
How to secure the application?
Hi all. A question for people who have experienced this and can advise useful materials to read or know from personal experience!
What aspects should be considered when developing a web application in order to pass an information security audit?
Both generally accepted practices and specific actions to meet the requirements of an integrated information security system (CSIS) are of interest.
Thank you!
Answer the question
In order to leave comments, you need to log in
OWASP Web Application Security Testing Checklist
And generally accepted practices should be searched for each item separately.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question