You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -61,9 +60,8 @@ Our primary goal is to prevent security issues before product delivery. We use t
61
60
62
61
We leverage leading commercial tools to automatically monitor and update third-party dependencies in our Telerik and Kendo GitHub projects, ensuring they remain secure and up-to-date. Alerts are enabled for all GitHub-hosted products, and the identified vulnerable dependencies are addressed by the repository code owners and security champions.
63
62
64
-
**Note**: Our definition of "done" includes successful builds that are scanned using top security scanning tools, and the resolution of any security alerts.
63
+
>Note: Our definition of "Done" includes successful builds that are scanned using top security scanning tools, and the resolution of any security alerts.
65
64
66
-
---
67
65
68
66
## Content Security Compliance
69
67
@@ -74,14 +72,10 @@ For more detailed information on CSP compliance for Telerik UI for ASP.NET AJAX,
74
72
75
73
This resource provides guidelines on how to configure your ASP.NET Web Forms application to comply with CSP requirements when using Telerik ASP.NET AJAX components.
76
74
77
-
---
78
-
79
75
## OWASP Top 10 Alignment
80
76
81
77
We closely monitor the [OWASP Top 10](https://owasp.org/www-project-top-ten/) list of security risks and align our security practices with these industry-leading standards. Regular updates ensure that our products address evolving security threats and vulnerabilities.
Telerik UI for ASP.NET AJAX provides a variety of security-related articles for individual controls. These resources outline best practices and recommendations for securing each control and mitigating potential risks. Below is a list of available security articles for specific controls:
@@ -98,5 +92,5 @@ Telerik UI for ASP.NET AJAX provides a variety of security-related articles for
98
92
99
93
These resources provide specific guidelines for configuring controls securely and mitigating the risks associated with their usage.
100
94
101
-
For more detailed answers to common security-related questions, please refer to our [Security FAQ page]({%slug: security/security-faq%}).
95
+
For more detailed answers to common security-related questions, please refer to our [Security FAQ page]({%slug security/security-faq%}).
0 commit comments