SWAG - Secure Web-Applications Guidelines
Planning
Threat Modeling
Design
Secure Communication Protocols
Secure Authentication
Implementation
Secure Coding
Penetration Testing
Mitigate OWASP Top 10
Testing and Integration
Automated Security Testing
Deployment
Secure Configurations
Maintenance
Regularly Update and Patch the Application
Conduct Regular Security Audits and Vulnerability Assessments
*click on a recommendation to get more information
Cumulative list of all resources