OWASP Cloud-Native Application Security Top 10
GPTKB entity
Statements (22)
Predicate | Object |
---|---|
gptkbp:instanceOf |
security guideline
|
gptkbp:category |
cloud security
application security |
gptkbp:contains |
CNA-01: Inadequate Identity and Access Controls
CNA-02: Insecure Secrets Management CNA-03: Overly Permissive Network Policies CNA-04: Insecure Workload Configurations CNA-06: Insecure Supply Chain CNA-07: Insecure Container Images CNA-08: Insecure Inter-Component Communications CNA-09: Lack of Proper Resource Isolation CNA-10: Insecure CI/CD Pipelines CNA-05: Inadequate Logging, Monitoring, and Response |
gptkbp:firstPublished |
2023
|
gptkbp:focusesOn |
cloud-native application security
|
https://www.w3.org/2000/01/rdf-schema#label |
OWASP Cloud-Native Application Security Top 10
|
gptkbp:language |
English
|
gptkbp:officialWebsite |
https://owasp.org/www-project-cloud-native-application-security-top-10/
|
gptkbp:publishedBy |
gptkb:OWASP
|
gptkbp:type |
Top 10 list
|
gptkbp:bfsParent |
gptkb:OWASP_Projects
|
gptkbp:bfsLayer |
6
|