Skip to content

Commit

Permalink
Translate ToC to Brazilian Portuguese - WIP
Browse files Browse the repository at this point in the history
  • Loading branch information
extern-c committed Sep 15, 2024
1 parent 714cfb2 commit acb058c
Showing 1 changed file with 72 additions and 72 deletions.
144 changes: 72 additions & 72 deletions _data/release-pt-br.yaml
Original file line number Diff line number Diff line change
@@ -1,58 +1,58 @@
docs_list_title: Developer Guide
docs_list_title: Guia do Desenvolvedor
docs:

- title: '1. Introduction'
- title: '1. Introdução'
url: introduction

- title: '2. Foundations'
- title: '2. Fundamentos'
url: foundations

- title: '2.1 Security fundamentals'
- title: '2.1 Fundamentos de segurança'
url: foundations/security_fundamentals

- title: '2.2 Secure development and integration'
- title: '2.2 Desenvolvimento e integração seguros'
url: foundations/secure_development

- title: '2.3 Principles of security'
- title: '2.3 Princípios de segurança'
url: foundations/security_principles

- title: '2.4 Principles of cryptography'
- title: '2.4 Princípios de criptografia'
url: foundations/crypto_principles

- title: '2.5 OWASP Top 10'
url: foundations/owasp_top_ten

- title: '3. Requirements'
- title: '3. Requisitos'
url: requirements

- title: '3.1 Requirements in practice'
- title: '3.1 Requisitos em prática'
url: requirements/requirements_in_practice

- title: '3.2 Risk profile'
- title: '3.2 Perfil de risco'
url: requirements/risk_profile

- title: '3.3 OpenCRE and Integration Standards'
- title: '3.3 OpenCRE e Padrões de Integração'
url: requirements/integration_standard_opencre

- title: '3.4 SecurityRAT'
url: requirements/security_rat

- title: '3.5 Application Security Verification Standard'
- title: '3.5 Padrão de Verificação de Segurança de Aplicações (ASVS)'
url: requirements/application_security_verification_standard

- title: '3.6 Mobile Application Security'
- title: '3.6 Segurança de Aplicativos Móveis'
url: requirements/mobile_application_security

- title: '3.7 Security Knowledge Framework'
- title: '3.7 Framework de Conhecimento de Segurança (SKF)'
url: requirements/security_knowledge_framework

- title: '4. Design'
url: /design

- title: '4.1 Threat modeling'
- title: '4.1 Modelagem de ameaças'
url: design/threat_modeling

- title: '4.1.1 Threat modeling in practice'
- title: '4.1.1 Modelagem de ameaças em prática'
url: design/threat_modeling/practical_threat_modeling

- title: '4.1.2 pytm'
Expand All @@ -67,61 +67,61 @@ docs:
- title: '4.1.5 LINDDUN GO'
url: design/threat_modeling/linddun-go

- title: '4.1.6 Threat Modeling toolkit'
- title: '4.1.6 Toolkit para Modelagem de Ameaças'
url: design/threat_modeling/toolkit

- title: '4.2 Web application checklist'
- title: '4.2 Lista de verificação para aplicação web'
url: design/web_app_checklist

- title: '4.2.1 Checklist: Define Security Requirements'
- title: '4.2.1 Lista de verificação: Defina Requisitos de Segurança'
url: design/web_app_checklist/define_security_requirements

- title: '4.2.2 Checklist: Leverage Security Frameworks and Libraries'
- title: '4.2.2 Lista de verificação: Leverage Security Frameworks and Libraries'
url: design/web_app_checklist/frameworks_libraries

- title: '4.2.3 Checklist: Secure Database Access'
- title: '4.2.3 Lista de verificação: Secure Database Access'
url: design/web_app_checklist/secure_database_access

- title: '4.2.4 Checklist: Encode and Escape Data'
- title: '4.2.4 Lista de verificação: Codifique e Escape Dados'
url: design/web_app_checklist/encode_escape_data

- title: '4.2.5 Checklist: Validate All Inputs'
- title: '4.2.5 Lista de verificação: Valide todas as entradas'
url: design/web_app_checklist/validate_inputs

- title: '4.2.6 Checklist: Implement Digital Identity'
- title: '4.2.6 Lista de verificação: Implement Digital Identity'
url: design/web_app_checklist/digital_identity

- title: '4.2.7 Checklist: Enforce Access Controls'
- title: '4.2.7 Lista de verificação: Enforce Access Controls'
url: design/web_app_checklist/access_controls

- title: '4.2.8 Checklist: Protect Data Everywhere'
- title: '4.2.8 Lista de verificação: Protect Data Everywhere'
url: design/web_app_checklist/protect_data

- title: '4.2.9 Checklist: Implement Security Logging and Monitoring'
- title: '4.2.9 Lista de verificação: Implemente Registro e Monitoramento de Segurança'
url: design/web_app_checklist/security_logging_and_monitoring

- title: '4.2.10 Checklist: Handle all Errors and Exceptions'
- title: '4.2.10 Lista de verificação: Handle all Errors and Exceptions'
url: design/web_app_checklist/handle_errors_and_exceptions

- title: '4.3 Mobile application checklist'
- title: '4.3 Lista de verificação de aplicativos móveis'
url: design/mas_checklist

- title: '5. Implementation'
- title: '5. Implementação'
url: implementation

- title: '5.1 Documentation'
- title: '5.1 Documentação'
url: implementation/documentation

- title: '5.1.1 Top 10 Proactive Controls'
- title: '5.1.1 Top 10 Controles Proativos'
url: implementation/documentation/proactive_controls

- title: '5.1.2 Go Secure Coding Practices'
- title: '5.1.2 Práticas de Codificação Segura em Go'
url: implementation/documentation/go_scp

- title: '5.1.3 Cheatsheet Series'
- title: '5.1.3 Série de Cheatsheet'
url: implementation/documentation/cheatsheets

- title: '5.2 Dependencies'
- title: '5.2 Dependências'
url: implementation/dependencies

- title: '5.2.1 Dependency_Check'
Expand All @@ -133,61 +133,61 @@ docs:
- title: '5.2.3 CycloneDX'
url: implementation/dependencies/cyclonedx

- title: '5.3 Secure Libraries'
- title: '5.3 Bibliotecas Seguras'
url: implementation/secure_libraries

- title: '5.3.1 Enterprise Security API library'
- title: '5.3.1 Biblioteca de API de Segurança Corporative'
url: implementation/secure_libraries/esapi

- title: '5.3.2 CSRFGuard library'
url: implementation/secure_libraries/csrf_guard

- title: '5.3.3 OWASP Secure Headers Project'
- title: '5.3.3 Projeto de Cabeçalhos Seguros OWASP (OSHP)'
url: implementation/secure_libraries/secure_headers

- title: '5.4 Implementation Do''s and Don''ts'
- title: '5.4 O que fazer e o que não fazer na Implementação'
url: implementation/dos_donts

- title: '5.4.1 Container security'
- title: '5.4.1 Segurança de containers'
url: implementation/dos_donts/container_security

- title: '5.4.2 Secure coding'
- title: '5.4.2 Codificação segura'
url: implementation/dos_donts/secure_coding

- title: '5.4.3 Cryptographic practices'
- title: '5.4.3 Práticas de criptografia'
url: implementation/dos_donts/cryptographic_practices

- title: '5.4.4 Application spoofing'
url: implementation/dos_donts/application_spoofing

- title: '5.4.5 Content Security Policy (CSP)'
- title: '5.4.5 Política de Segurança de Conteúdo (CSP)'
url: implementation/dos_donts/content_security_policy

- title: '5.4.6 Exception and error handling'
- title: '5.4.6 Tratamento de erros e exceções'
url: implementation/dos_donts/exception_error_handling

- title: '5.4.7 File management'
- title: '5.4.7 Gerenciamento de arquivos'
url: implementation/dos_donts/file_management

- title: '5.4.8 Memory management'
- title: '5.4.8 Gerenciamento de memória'
url: implementation/dos_donts/memory_management

- title: '6. Verification'
- title: '6. Verificação'
url: verification

- title: '6.1 Guides'
- title: '6.1 Guias'
url: verification/guides

- title: '6.1.1 Web Security Testing Guide'
- title: '6.1.1 Guia de Testes de Segurança para Aplicações Web'
url: verification/guides/web_security_testing_guide

- title: '6.1.2 MAS Testing Guide'
- title: '6.1.2 Guia de Tests MAS'
url: verification/guides/mas_testing_guide

- title: '6.1.3 Application Security Verification Standard'
- title: '6.1.3 Padrão de Verificação de Segurança de Aplicações (ASVS)'
url: verification/guides/application_security_verification_standard

- title: '6.2 Tools'
- title: '6.2 Ferramentas'
url: verification/tools

- title: '6.2.1 Zed Attack Proxy'
Expand All @@ -202,7 +202,7 @@ docs:
- title: '6.2.4 Nettacker'
url: verification/tools/nettacker

- title: '6.2.5 OWASP Secure Headers Project'
- title: '6.2.5 Projeto de Cabeçalhos Seguros OWASP (OSHP)'
url: verification/tools/secure_headers

- title: '6.3 Frameworks'
Expand All @@ -211,28 +211,28 @@ docs:
- title: '6.3.1 secureCodeBox'
url: verification/frameworks/secure_codebox

- title: '6.4 Vulnerability management'
- title: '6.4 Gerenciamento de vulnerabilidades'
url: verification/vulnerability_management

- title: '6.4.1 DefectDojo'
url: verification/vulnerability_management/defectdojo

- title: '6.5 Verification Do''s and Don''ts'
- title: '6.5 O que fazer e o que não fazer na Verificação'
url: verification/dos_donts

- title: '6.5.1 Secure environment'
- title: '6.5.1 Ambiente seguro'
url: verification/dos_donts/secure_environment

- title: '6.5.2 System hardening'
- title: '6.5.2 Hardening de sistemas'
url: verification/dos_donts/system_hardening

- title: '6.5.3 Open Source software'
url: verification/dos_donts/open_source_software

- title: '7. Training and Education'
- title: '7. Treinamento e Educação'
url: training_education

- title: '7.1 Vulnerable Applications'
- title: '7.1 Aplicações Vulneráveis'
url: training_education/vulnerable_applications

- title: '7.1.1 Juice Shop'
Expand All @@ -256,7 +256,7 @@ docs:
- title: '7.4 SamuraiWTF'
url: training_education/samurai_wtf

- title: '7.5 OWASP Top 10 project'
- title: '7.5 Projeto OWASP Top 10'
url: training_education/owasp_top_ten

- title: '7.6 Mobile Top 10'
Expand All @@ -274,7 +274,7 @@ docs:
- title: '8. Culture building and Process maturing'
url: culture_building_and_process_maturing

- title: '8.1 Security Culture'
- title: '8.1 Cultura de Segurança'
url: culture_building_and_process_maturing/security_culture

- title: '8.2 Security Champions'
Expand All @@ -289,16 +289,16 @@ docs:
- title: '8.2.3 Security Champions Playbook'
url: culture_building_and_process_maturing/security_champions/security_champions_playbook

- title: '8.3 Software Assurance Maturity Model'
- title: '8.3 Model de Maturidade de Software Assurance (SAMM)'
url: culture_building_and_process_maturing/software_assurance_maturity_model

- title: '8.4 Application Security Verification Standard'
- title: '8.4 Padrão de Verificação de Segurança de Aplicações (ASVS)'
url: culture_building_and_process_maturing/application_security_verification_standard

- title: '8.5 Mobile Application Security'
- title: '8.5 Segurança de Aplicativos Móveis'
url: culture_building_and_process_maturing/mobile_application_security

- title: '9. Operations'
- title: '9. Operações'
url: operation

- title: '9.1 DevSecOps Guideline'
Expand All @@ -313,23 +313,23 @@ docs:
- title: '9.4 OWASP CRS'
url: operations/crs

- title: '10. Metrics'
- title: '10. Métricas'
url: metrics

- title: '11. Security gap analysis'
- title: '11. Análise de lacunas de segurança'
url: security_gap_analysis

- title: '11.1 Guides'
- title: '11.1 Guias'
url: security_gap_analysis/guides

- title: '11.1.1 Software Assurance Maturity Model'
- title: '11.1.1 Model de Maturidade de Software Assurance (SAMM)'
url: security_gap_analysis/guides/software_assurance_maturity_model

- title: '11.1.2 Application Security Verification Standard'
- title: '11.1.2 Padrão de Verificação de Segurança de Aplicações (ASVS)'
url: security_gap_analysis/guides/application_security_verification_standard

- title: '11.1.3 Mobile Application Security'
- title: '11.1.3 Segurança de Aplicativos Móveis'
url: security_gap_analysis/guides/mobile_application_security

- title: '11.2 Bug Logging Tool'
- title: '11.2 Ferramenta de registro de bugs'
url: security_gap_analysis/bug_logging_tool

0 comments on commit acb058c

Please sign in to comment.