With the development of the Internet in Morocco, public administrations increasingly seek to establish an online presence through websites or web applications offering services to citizens or third parties. However, vulnerabilities in these web applications have become the most significant vector for attacks on the information systems of these administrations. According to various reports published this year by observatories and cybersecurity companies, web attacks are continuously increasing. The consequences can be severe for the affected administrations:
Therefore, we can no longer tolerate even the simplest issues, such as those presented in the OWASP Top 10, which are primarily due to insecure development and deployment. Thus, implementing methods and tools to manage the development and quality control of applications is more necessary than ever to reduce their vulnerability.
In this context, this guide aims to help information system security managers by presenting security rules to be followed during the various phases of an application’s lifecycle to better secure their web applications.
This document is organized into four parts:
To report any criminal digital content, including threats to the security of individuals and groups, praise or incitement of terrorism, and violations of the rights and freedoms of children, please use the following platform : www.e-blagh.ma
DGSSI2024 All rights reserved