{"id":660,"date":"2020-02-11T11:36:00","date_gmt":"2020-02-11T11:36:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=660"},"modified":"2025-04-28T12:24:04","modified_gmt":"2025-04-28T12:24:04","slug":"what-is-owasp-your-guide-to-the-open-web-application-security-project","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/","title":{"rendered":"What Is OWASP? Your Guide to the Open Web Application Security Project"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">OWASP is the kickass foundation that develops open source solutions developers &amp; appsec pros can use to improve security \u2014 here\u2019s what you need to know<\/h2>\n\n\n\n<p>If you\u2019re someone who\u2019s just trying to wrap your brain around understanding what the biggest cybersecurity risks are, it can be confusing. There are a lot of different resources to look at, and there\u2019s one in particular that you might have heard of but know nothing about. That\u2019s likely something called OWASP. <\/p>\n\n\n\n<p>But what is OWASP and why is it something you definitely\nneed to know? Let\u2019s break down what it is and some of the things it\nencompasses. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is OWASP and What Does OWASP Stand For?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"214\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/owasp_logo.png\" alt=\"Graphic: What is OWASP? This is a copy of the Open Web Application Security Project.\" class=\"wp-image-661\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/owasp_logo.png 600w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/owasp_logo-300x107.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/owasp_logo-560x200.png 560w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>OWASP, which stands for the <a href=\"https:\/\/owasp.org\/about\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Open Web Application Security Project<\/a>, is a credible non-profit foundation that focuses on improving security for businesses, customers, and developers alike. It does this through dozens of open source projects, collaboration and training opportunities. Whether you\u2019re a novice or an experienced app developer, OWASP has something to offer.<\/p>\n\n\n\n<p>That\u2019s because OWASP is well-known throughout the appsec\ncommunity \u2014 and it\u2019s no small thing. In fact, OWASP is a massive, goal-oriented\ncommunity that consists of tens of thousands of members across more than 275\nlocal chapters around the world! Since 2001, it has enabled professionals to\ncome together to work toward a greater goal of improving application security. <\/p>\n\n\n\n<p>When most people think of OWASP, their thoughts tend to automatically\nfocus on the OWASP top 10 list. But what if I told you that there was more to\nOWASP than just its best-known top 10 list? Let\u2019s explore them, starting with\nthe first (and best known) list of vulnerabilities. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exploring the OWASP Top 10 Vulnerabilities<\/h2>\n\n\n\n<p>We won\u2019t go too deeply into the topic of the OWASP top 10 vulnerabilities\nhere, but we\u2019d be remiss if we didn\u2019t at least take the time to mention them. That\u2019s\na critical part of answering the question \u201cwhat is OWASP?\u201d <\/p>\n\n\n\n<p>The <a href=\"https:\/\/sectigostore.com\/blog\/owasp-iot-top-10-iot-vulnerabilities\/\">list of the OWASP top 10 vulnerabilities<\/a> is much like\nhow it sounds \u2014 it\u2019s a list of the 10 most critical security risks to web\napplications that have been identified by developers. It\u2019s an invaluable\nresource that can help you to increase security and implement change within\nyour organization by minimizing risks. Updated every few years, it\u2019s something\nthat developers and organizations worldwide have come to rely upon for\ninformation on critical cyber security-related vulnerabilities. <\/p>\n\n\n\n<p>So, what are the top 10 application security\nvulnerabilities?<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Injection<\/li><li>Broken Authentication<\/li><li>Sensitive Data Exposure<\/li><li>XML External Entities (XXE)<\/li><li>Broken Access Control<\/li><li>Security Misconfiguration <\/li><li>Cross-Site Scripting (XSS)<\/li><li>Insecure Deserialization<\/li><li>Using Components with Known Vulnerabilities<\/li><li>Insufficient Logging &amp; Monitoring<\/li><\/ol>\n\n\n\n<p>As I said just moments ago, I\u2019m not going to drill-down into the specifics here. If you want to learn more about what these individual vulnerabilities are and how to mitigate them, be sure to check out our other blog that specifically focuses on the <a href=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-what-are-the-owasp-top-10-vulnerabilities\/\">OWASP top 10 vulnerabilities<\/a>. <\/p>\n\n\n\n<p>Next, we\u2019re going to move on to the next and newest list of\nOWASP vulnerabilities. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">OWASP Top 10 Internet of Things Project<\/h2>\n\n\n\n<p>The Internet of Things (IoT) is growing at an unprecedented rate. <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Gartner forecasts<\/a> that by 2021, there will be 25 billion connected devices in use. This gives a glimpse into the level of growth that we\u2019re talking about here. That\u2019s a lot of devices \u2014 potentially insecure devices \u2014 that are connected to networks and creating vulnerabilities that hackers can exploit. &nbsp;<\/p>\n\n\n\n<p>This is another place that OWASP can help. OWASP\u2019s top 10\ninternet of things aims to help all stakeholders \u2014 everyone from manufacturers\nand developers to the end users \u2014 better understand the risks of connected\ntechnology in an ever-increasing IoT world.<\/p>\n\n\n\n<p>Now, they\u2019ve put out a list of the <a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">10 most critical pitfalls<\/a> to avoid when developing, deploying, and\/or managing IoT systems. <\/p>\n\n\n\n<p>So, what items make the list of the OWASP top 10 Internet of\nThings vulnerabilities?<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Weak, Guessable, or Hardcoded Passwords<\/li><li>Insecure Network Services<\/li><li>Insecure Ecosystem Interfaces<\/li><li>Lack of Secure Update Mechanism<\/li><li>Use of Insecure or Outdated Components<\/li><li>Insufficient Privacy Protection<\/li><li>Insecure Data Transfer and Storage<\/li><li>Lack of Device Management<\/li><li>Insecure Default Settings<\/li><li>Lack of Physical Hardening<\/li><\/ol>\n\n\n\n<p>We\u2019ll go more into this in a future article on Infosec\nInsights. But for now, let\u2019s move on to one example of how these lists of\nvulnerabilities are applied within the community. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is OWASP Juice Shop?<\/h2>\n\n\n\n<p>According to the OWASP website, the name \u201c<a href=\"https:\/\/owasp.org\/www-project-juice-shop\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">juice shop<\/a>\u201d actually comes from a word-by-word reverse translation from German\u2019s <em>saftladen<\/em>, which roughly means \u201cdump\u201d or \u201cuseless outfit.\u201d <\/p>\n\n\n\n<p>Um, yeah. Well, that definition probably doesn\u2019t help much.\nLet\u2019s dig a little deeper. <\/p>\n\n\n\n<p>Basically, OWASP\u2019s Juice Shop is a place where developers,\npen testers, and other users can go to test out and exploit vulnerabilities on\nan insecure system. That\u2019s because, despite its unintuitive name, the juice shop\nis a modern and sophisticated web application that\u2019s intentionally designed to\nbe insecure. It is designed with the OWASP Top Ten list of vulnerabilities\nbuilt into it. <\/p>\n\n\n\n<p>But why would someone create something like that, that\u2019s\ncompletely insecure? Essentially, the OWASP Juice Shop was created to serve as\na guinea pig and testing ground for dev and IT security experts alike. This\npowerful platform is useful for awareness demonstrations, capture the flag\n(CTF) events, security trainings, and other purposes. <\/p>\n\n\n\n<p>What are the benefits of using the OWASP Juice Shop? <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>It\u2019s Free and Accessible to Anyone.<\/strong> Don\u2019t\nwant to pay for a license or have to deal with bureaucratic headaches? Don\u2019t.\nThat\u2019s one of the beautiful things about OWASP Juice Shop \u2014it\u2019s here, it\u2019s\navailable, and you don\u2019t have to fork a bunch of money or resources over to use\nit. In this case, you can\u2019t beat free.<\/li><li><strong>It\u2019s Self-Contained and Auto-Resets.<\/strong>\nEverything you need is pre-packaged and downloads automatically. Furthermore,\nonce you\u2019re done with the databases, it auto-wipes and repopulates every time\nthe server restarts. This way, you never have to worry about resetting everything\nmanually the next time you want to use it. <\/li><li><strong>Offers Multiple Installation Options<\/strong>.\nWant to choose what you want to run on Windows and Linux? Awesome. You can\nchoose between Docker, node.js and Vagrant. <\/li><li><strong>Tracking Made Easy.<\/strong> Imagine an\napplication that notifies you whenever challenges are solved. The OWASP Juice\nShop does that. Furthermore, if you want to keep tabs of successful\nvulnerability exploits, you can do so using its user-friendly scoreboard\nfeature. &nbsp;<\/li><li><strong>Make It Your Own.<\/strong> Want the application to\nlook like it\u2019s one of your corporate solutions? No problem. The OWASP juice\nshop is fully customizable in terms of branding. <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is OWASP IoT Goat?<\/h2>\n\n\n\n<p>Much like OWASP Juice Shop, <a href=\"https:\/\/wiki.owasp.org\/index.php\/OWASP_Internet_of_Things_Project#tab=IoTGoat\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OWASP IoTGoat<\/a> (which was set to be released in December 2019) is an insecure platform that\u2019s used for educational and demonstrative purposes. It\u2019s based on OpenWrt, or what\u2019s known as OPEN Wireless RouTer, an open-source Linux-based router firmware.<\/p>\n\n\n\n<p>Essentially, IoTGoat is the IoT equivalent of the Juice\nShop. Much like how OWASP Juice Shop integrates the Top 10 application\nvulnerabilities, IoTGoat is built with IoT vulnerabilities integrated into it.\nWhy? Because there are many unaddressed vulnerabilities that can be found in\nIoT devices, and the project aims to teach users about the most common varieties.\nThat means, of course, that these vulnerabilities are based on the OWASP Top 10\nIoT Vulnerabilities that we mentioned earlier. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is OWASP Zed Attack Proxy (ZAP)?<\/h2>\n\n\n\n<p>OWASP ZAP, or what\u2019s known as the <a href=\"https:\/\/www.zaproxy.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OWASP Zed Attack Proxy<\/a>, is an a flexible and invaluable web security tool for new and experienced app security experts alike. Essentially serving as a man-in-the-middle (MitM) proxy, it intercepts and inspects messages that are sent between the client and the web application that\u2019s being tested. <\/p>\n\n\n\n<p>With its powerful APIs and security automation, ZAP simplifies\nthe software security testing process for everyone from new testers to\nexperienced app developers and testing specialists. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What&#8217;s OWASP Known for Concerning Security?<\/h2>\n\n\n\n<p>Creating top 10 lists and intentionally insecure environments aren\u2019t all that OWASP is known for. The Open Web Application Security Project has multiple <a href=\"https:\/\/owasp.org\/projects\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">other notable ongoing projects<\/a> as well going on simultaneously. Their projects can be broken down into a few overarching categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Flagship Projects<\/strong> \u2014 This category\nincludes projects like OWASP Juice Shop, OWASP SAMM, OWASP Top Ten, OWASP Zap,\netc. (We\u2019ll talk about some of these shortly.)<\/li><li><strong>Lab Projects<\/strong> \u2014 These projects include OWASP\nInternet of Things, OWASP WebGoat, OWASP Enterprise Security API (ESAPI), etc. <\/li><li><strong>Incubator Projects<\/strong> \u2014 This group of\nprojects include the OWASP Risk Assessment Framework (RAF), OWASP Docker Top\n10, OWASP SamuraiWTF, etc.<\/li><li><strong>Projects Requiring Website Updates<\/strong> \u2014This\ncategory includes OWASP Broken Web Applications, OWASP Cloud Security, OWASP\nHoneypot, etc. <\/li><\/ul>\n\n\n\n<p>We don\u2019t have the time to cover all of them, so be sure to\ncheck out the previous link if you want to see them all. <\/p>\n\n\n\n<p>Three examples of other notable OWASP projects include:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">OWASP Cheat Sheet Series (OCSS)<\/h3>\n\n\n\n<p><a href=\"https:\/\/cheatsheetseries.owasp.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"This resource (opens in a new tab)\">This resource<\/a>, which now lives in an <a href=\"https:\/\/github.com\/OWASP\/CheatSheetSeries\">OCSS GitHub repository<\/a>, provides appsec security professionals with shortcuts and guidance through \u201ccheat sheets\u201d on specific security-related topics. The idea behind the <a href=\"https:\/\/owasp.org\/www-project-cheat-sheets\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OWASP Cheat Sheet Series<\/a> was to create quick resources that help to lessen the burden of their responsibilities.&nbsp; <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">OWASP Security Assurance Maturity Model (SAMM)<\/h3>\n\n\n\n<p>Need to improve the security posture of your software in a measurable way? Then look no further than <a href=\"https:\/\/owasp.org\/www-project-samm\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OWASP SAMM<\/a>. This self-assessment model helps you to evaluate your existing software security practices and security-related activities. Simply put, it\u2019s another open framework that helps organizations create risk-specific strategies to improve their software security. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">OWASP Security Knowledge Framework (SKF) <\/h3>\n\n\n\n<p>Looking for appsec best practices? Not sure of the best approach to writing secure code? Or, maybe you want to learn how to integrate security by design into your web app(s). No worries \u2014 regardless of which scenario best fits your situation, OWASP has you covered. Their <a href=\"https:\/\/owasp.org\/www-project-security-knowledge-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Security Knowledge Framework<\/a>, or SFK for short, is an open-source resource knowledgebase for app developers that provides those types of information. It serves as a great training resource as well and provides excellent examples and guidance for how to approach different appsec issues. &nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>No matter whether you\u2019re a software developer, an ethical\nhacker, or just an IT security professional who wants to keep your business and\nsoftware applications secure, OWASP is an essential resource. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>OWASP is the kickass foundation that develops open source solutions developers &amp; appsec pros can use to improve security \u2014 here\u2019s what you need to know If you\u2019re someone who\u2019s&#8230;<\/p>\n","protected":false},"author":8,"featured_media":665,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13],"tags":[37,38],"class_list":["post-660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-owasp","tag-web-application-security","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Wondering what is OWASP and why should I care about it? We&#039;ll break down what the Open Web Application Security Project is and why it matters.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Wondering what is OWASP and why should I care about it? We&#039;ll break down what the Open Web Application Security Project is and why it matters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T11:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:24:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"What Is OWASP? Your Guide to the Open Web Application Security Project\",\"datePublished\":\"2020-02-11T11:36:00+00:00\",\"dateModified\":\"2025-04-28T12:24:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/\"},\"wordCount\":1745,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/application-security.jpg\",\"keywords\":[\"OWASP\",\"web application security\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/\",\"name\":\"What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/application-security.jpg\",\"datePublished\":\"2020-02-11T11:36:00+00:00\",\"dateModified\":\"2025-04-28T12:24:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Wondering what is OWASP and why should I care about it? We'll break down what the Open Web Application Security Project is and why it matters.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/application-security.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/application-security.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Graphic: web application security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-owasp-your-guide-to-the-open-web-application-security-project\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is OWASP? Your Guide to the Open Web Application Security Project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights","description":"Wondering what is OWASP and why should I care about it? We'll break down what the Open Web Application Security Project is and why it matters.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/","og_locale":"en_US","og_type":"article","og_title":"What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights","og_description":"Wondering what is OWASP and why should I care about it? We'll break down what the Open Web Application Security Project is and why it matters.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/","og_site_name":"InfoSec Insights","article_published_time":"2020-02-11T11:36:00+00:00","article_modified_time":"2025-04-28T12:24:04+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"What Is OWASP? Your Guide to the Open Web Application Security Project","datePublished":"2020-02-11T11:36:00+00:00","dateModified":"2025-04-28T12:24:04+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/"},"wordCount":1745,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg","keywords":["OWASP","web application security"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/","url":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/","name":"What Is OWASP? Your Guide to the Open Web Application Security Project - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg","datePublished":"2020-02-11T11:36:00+00:00","dateModified":"2025-04-28T12:24:04+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Wondering what is OWASP and why should I care about it? We'll break down what the Open Web Application Security Project is and why it matters.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/application-security.jpg","width":1600,"height":1000,"caption":"Graphic: web application security"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is OWASP? Your Guide to the Open Web Application Security Project"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":5,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"predecessor-version":[{"id":1695,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions\/1695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/665"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}