Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion document/1.0/02-Frontispiece.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ John is a distinguished security architect at Bentley Systems with many years of
- Einaras Bartkus
- Thomas Chauchefoin
- Samuel Aubert
- Vishant Gawali


## Special Thanks
Expand All @@ -40,4 +41,4 @@ Bentley Systems is dedicated to advancing the world's infrastructure through sof

Copyright © The OWASP Foundation. This work is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](https://creativecommons.org/licenses/by-sa/4.0/ "Creative Commons Attribution-ShareAlike 4.0 International License"). For any reuse or distribution, you must make clear to others the license terms of this work.

\newpage{}
\newpage{}
5 changes: 5 additions & 0 deletions document/1.0/03-Using_the_TASVS.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ The standard is divided into various groups labelled `TASVS-{word}` that represe
- TASVS-NETWORK - Communication and privacy.
- TASVS-STORAGE - Data storage considerations.
- TASVS-FUTURE - Coming soon General considerations for future cloud adoption strategies.
- TASVS-REMOTE - Remote Desktop, VDI & Kiosk Security.

### Sub Group

Expand All @@ -41,6 +42,10 @@ The standard is divided into various groups labelled `TASVS-{word}` that represe
- TASVS-NETWORK-4 - Connected Services
- TASVS-STORAGE-1 - Sensitive Information Review
- TASVS-STORAGE-2 - DLL Hijacking
- TASVS-REMOTE-1 – Remote Desktop (RDP) Security
- TASVS-REMOTE-2 – Virtual Desktop Infrastructure (VDI)
- TASVS-REMOTE-3 – Kiosk Mode Security



## Application Security Verification Levels
Expand Down
Loading