OWASP Top 10 - Summarized

OWASP Top 10 - Summarized

1. A01:2021-Broken Access Control: Elevated from the fifth position, detected in 94% of applications. This risk refers to situations where users are able to access data or functionalities that they're not supposed to.

2. A02:2021-Cryptographic Failures: Formerly known as Sensitive Data Exposure, it now places emphasis on failures related to cryptography.

3. A03:2021-Injection: Slid down to third place. Concerns injection flaws, such as SQL, OS, and LDAP injection.

4. A04:2021-Insecure Design: A new category focused on risks related to design flaws and overall architecture of software.

5. A05:2021-Security Misconfiguration: Up from #6 and includes risks associated with misconfigurations in applications, including situations where security settings are defined, implemented, and maintained as defaults.

6. A06:2021-Vulnerable and Outdated Components: Previously named Using Components with Known Vulnerabilities, this category covers risks due to usage of outdated or vulnerable components.

7. A07:2021-Identification and Authentication Failures: Previously named Broken Authentication, it deals with risks involved with the implementation of identity and access controls.

8. A08:2021-Software and Data Integrity Failures: A new category that deals with making assumptions related to software updates, critical data, and CI/CD pipelines without verifying their integrity.

9. A09:2021-Security Logging and Monitoring Failures: Previously named Insufficient Logging & Monitoring, this category has been expanded to cover more types of failures.

10. A10:2021 - Server-Side Request Forgery (SSRF): This risk refers to the server-side exploitation of the ability to make HTTP requests to arbitrary domains.

These risks represent the key areas that developers and organizations should focus on to ensure secure coding and development practices, with a goal to significantly reduce these common risks.

要查看或添加评论,请登录

Akshat Anil Ratanpal的更多文章

社区洞察

其他会员也浏览了