OWASP Cloud-Native Application Security Top 10
GPTKB entity
Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_guideline
|
| gptkbp:category |
cloud security
application security |
| gptkbp:contains |
CNA-01: Inadequate Identity and Access Controls
CNA-02: Insecure Secrets Management CNA-03: Overly Permissive Network Policies CNA-04: Insecure Workload Configurations CNA-06: Insecure Supply Chain CNA-07: Insecure Container Images CNA-08: Insecure Inter-Component Communications CNA-09: Lack of Proper Resource Isolation CNA-10: Insecure CI/CD Pipelines CNA-05: Inadequate Logging, Monitoring, and Response |
| gptkbp:firstPublished |
2023
|
| gptkbp:focusesOn |
cloud-native application security
|
| gptkbp:language |
English
|
| gptkbp:officialWebsite |
https://owasp.org/www-project-cloud-native-application-security-top-10/
|
| gptkbp:publishedBy |
gptkb:OWASP
|
| gptkbp:type |
Top 10 list
|
| gptkbp:bfsParent |
gptkb:Web_Application_Security_Project_(OWASP)
gptkb:OWASP_Projects |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
OWASP Cloud-Native Application Security Top 10
|