Skip to content

Commit

Permalink
Fixing tags for all files
Browse files Browse the repository at this point in the history
  • Loading branch information
Sharkeonix committed Oct 16, 2024
1 parent 3eadd5d commit 98526f1
Show file tree
Hide file tree
Showing 19 changed files with 20 additions and 159 deletions.
8 changes: 1 addition & 7 deletions docs/2024/0x00-notice.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,7 @@
---
title: Notice
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- notice
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks notice
---

# Release / Changelog
Expand Down
8 changes: 1 addition & 7 deletions docs/2024/ISR00-about-owasp.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,7 @@
---
title: About OWASP
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- about
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks about
---

# About OWASP
Expand Down
8 changes: 1 addition & 7 deletions docs/2024/ISR00_2024_Introduction.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,7 @@
---
title: Introduction
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- introduction
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks introduction
---

# Introduction
Expand Down
10 changes: 1 addition & 9 deletions docs/2024/ISR01_2024-Outdated_Software.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,7 @@
---
title: Outdated Software
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int01
- outdated
- software
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks outdated software isr01
---

# ISR01:2024 – Outdated Software
Expand Down
11 changes: 1 addition & 10 deletions docs/2024/ISR02_2024-Insufficient_Threat_Detection.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,7 @@
---
title: Insufficient Threat Detection
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int02
- insufficient
- threat
- detection
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insufficient threat detection isr02
---

# ISR02:2024 – Insufficient Threat Detection
Expand Down
10 changes: 1 addition & 9 deletions docs/2024/ISR03_2024-Insecure_Configurations.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,7 @@
---
title: Insecure Configurations
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int03
- insecure
- configurations
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure configurations isr03
---

# ISR03:2024 – Insecure Configurations
Expand Down
13 changes: 1 addition & 12 deletions docs/2024/ISR04_2024-Insecure_Resource_and_User_Management.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,7 @@
---
title: Insecure Resource and User Management
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int04
- insecure
- resource
- and
- user
- management
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure resource and user management isr04
---

# ISR04:2024 – Insecure Resource and User Management
Expand Down
12 changes: 1 addition & 11 deletions docs/2024/ISR05_2024-Insecure_Use_of_Cryptography.md
Original file line number Diff line number Diff line change
@@ -1,17 +1,7 @@
---
title: Insecure Use of Cryptography
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int05
- insecure
- use
- of
- cryptography
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure use of cryptography isr05
---

# ISR05:2024 – Insecure Use of Cryptography
Expand Down
12 changes: 1 addition & 11 deletions docs/2024/ISR06_2024-Insecure_Network_Access_Management.md
Original file line number Diff line number Diff line change
@@ -1,17 +1,7 @@
---
title: Insecure Network Access Management
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int06
- insecure
- network
- access
- management
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure network access management isr06
---

# ISR06:2024 – Insecure Network Access Management
Expand Down
Original file line number Diff line number Diff line change
@@ -1,19 +1,7 @@
---
title: Insecure Authentication Methods and Default Credentials
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int07
- insecure
- and
- default
- credentials
- infrastructure
- infrastructure-threats
- authentication
- methods
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure authentication methods and default credentials isr07
---

# ISR07:2024 – Insecure Authentication Methods and Default Credentials
Expand Down
10 changes: 1 addition & 9 deletions docs/2024/ISR08_2024-Information_Leakage.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,7 @@
---
title: Information Leakage
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int08
- information
- leakage
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks information leakage isr08
---

# ISR08:2024 - Information Leakage
Expand Down
Original file line number Diff line number Diff line change
@@ -1,20 +1,7 @@
---
title: Insecure Access to Ressources and Management Components
title: Insecure Access to Resources and Management Components
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int09
- insecure
- access
- to
- ressources
- and
- management
- components
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insecure access to resources and management components isr09
---

# ISR09:2024 – Insecure Access to Resources and Management Components
Expand Down
Original file line number Diff line number Diff line change
@@ -1,18 +1,7 @@
---
title: Insufficient Asset Management and Documentation
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- int10
- insufficient
- asset
- management
- and
- documentation
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks insufficient asset management and documentation isr10
---

# ISR10:2024 – Insufficient Asset Management and Documentation
Expand Down
9 changes: 1 addition & 8 deletions docs/2024/ISR_2024-Next_Steps.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,7 @@
---
title: Next Steps
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- next
- steps
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks next steps
---

# Next Steps
Expand Down
11 changes: 1 addition & 10 deletions docs/2024/ISR_2024-Open_Call_for_Data.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,7 @@
---
title: Open Call for Data
layout: col-sidebar
tags:
- owasp
- top-10
- threats
- open
- call
- for
- data
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks open call for data
---

# Open Call for Data -> OWASP Top 10 Infrastructure Security Risks - Version 2026
Expand Down
7 changes: 1 addition & 6 deletions index.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
layout: col-sidebar
title: OWASP Top 10 Infrastructure Security Risks
tags:
- owasp
- top-10
- threats
- infrastructure
- infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks
level: 2
type:
pitch: Most common and critical Infrastructure Security Risks
Expand Down
2 changes: 1 addition & 1 deletion tab_notice.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ displaytext: Notice
layout: null
tab: true
order: 1
tags: owasp top-10 threats infrastructure infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks
---

# Notice
Expand Down
2 changes: 1 addition & 1 deletion tab_opencallfordata.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ displaytext: Open Call for Data
layout: null
tab: true
order: 3
tags: owasp top-10 threats infrastructure infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks
---

# Open Call for Data -> OWASP Top 10 Infrastructure Security Risks - Version 2026
Expand Down
2 changes: 1 addition & 1 deletion tab_sponsors.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ displaytext: Sponsors
layout: null
tab: true
order: 2
tags: owasp top-10 threats infrastructure infrastructure-threats
tags: owasp top-10 threats infrastructure infrastructure-threats security risks infrastructure-security-risks
---

# Sponsors of the Project
Expand Down

0 comments on commit 98526f1

Please sign in to comment.