Mitigation of OWASP Top 10 (2021) Vulnerabilities:
Amarjit Gajare
Certified Ethical Hacker (CEH v12 practical) | Cyber Security Engineer | SIEM - Splunk , ArcSight | Incident response | Malware Analysis | Email Analysis | IDS/IPS | Firewall | Antivirus | Web Proxy | EDR | OSINT | XDR |
The Open Web Application Security Project (OWASP) is a non-profit entity dedicated to offering guidance for secure software application development and maintenance. It gained prominence through its compilation of the Top 10 web application security vulnerabilities. These vulnerabilities highlight critical risks that impact web applications.
More significantly, the OWASP Top 10 elucidates various categories of application security risks, offering preventive measures for developers and prescribing best practices to mitigate existing vulnerabilities.
First introduced in 2003, subsequent versions of the OWASP Top 10 were released in 2004, 2007, 2010, 2013, 2017,?and?2021."
In this article we cover the following OWASP web application security risks:
A1. Broken Access Control
A2. Cryptographic Failures
A3. Injections
A4. Insecure Design
A5. Security Misconfigurations
A6. Vulnerable and Outdated Components
A7. Identification and Authentication Failures
A8. Software and Data Integrity Failures
A9. Security Logging and Monitoring Failures
A10. Server-side Request Forgery (SSRF)
A1. Broken Access Control-
When access control is breached, an attacker can gain access to user accounts, admin panels, databases, servers, sensitive information, business-critical applications, and other sensitive assets. It can allow unauthorized users to modify privileges to their advantage, and perform destructive operations such as tampering with data or destroying it
A2. Cryptographic Failures-
Cryptographic failures (formerly listed in the Top 10 as “sensitive data exposure”) moved from position 3 to 2. It emphasizes encryption errors or lack of encryption that can lead to the exposure of sensitive data.
领英推荐
A3. Injections-
Injection is an attack against a website that exploits vulnerabilities in the database or other part of the operating environment. Most injection attacks rely on a web application’s inability to distinguish user inputs from its own code. The attacker can then run malicious code in the application context, gaining access to protected areas and sensitive data.
A4. Insecure Design-
This is a new category introduced by OWASP in 2021. It focuses on design and architectural flaws. Avoiding them requires careful threat modeling, taking security into consideration at the software design stage, and using reference architectures.
A5. Security Misconfigurations-
Common setup issues, such as incorrect access control configuration, can allow attackers to quickly and easily gain access to sensitive data and application functions. These include inappropriate permissions, unnecessary feature activation, use of default accounts and passwords, misconfigured HTTP headers, and detailed error messages.
A6. Vulnerable and Outdated Components-
Most web applications use third-party components, either open source or proprietary. These components contain code that is outside the organization’s control, which can lead to undesirable outcomes like accent control violations and injection attacks.
A7. Identification and Authentication Failures-
Functions related to user authentication and session management, if not properly implemented, can expose users to security credentials, grant excessive privileges, or enable users to impersonate other identities.
Data integrity is becoming a primary concern for software security. This is a new category introduced by OWASP in 2021, which focuses on the integrity of software updates, critical application data, and CI/CD pipelines. A software and data integrity failure occurs when any of these are tampered with by an attacker, and other components within the application do not verify their integrity.
A9. Security Logging and Monitoring Failures-
When suspicious behavior occurs in an application and logging and monitoring are not in place, security breaches are much more likely to be successful. This category focuses on identifying, escalating, and resolving security incidents. Detecting a breach is almost impossible without logging and monitoring.
A10. Server-side Request Forgery (SSRF)-
This category was added to the OWASP Top 10 list in 2021 because it was the top vulnerability voted in the OWASP Top 10 Community Survey. An SSRF vulnerability allows an attacker to access data on a remote resource based on an unauthenticated, custom URL. Even servers protected by a firewall or VPN can be vulnerable to this vulnerability, if they accept unvalidated user input.