OWASP Top 10 Overview
55 min
OWASP — Open Web Application Security Project
OWASP is a non-profit foundation that works to improve software security. The OWASP Top 10 is the definitive list of the most critical web application security risks, updated regularly based on real-world data from thousands of organizations.
OWASP TOP 10 (2021)
══════════════════════════════════════════════════════
A01 Broken Access Control ← #1 risk; 94% of apps tested
A02 Cryptographic Failures ← Formerly "Sensitive Data Exposure"
A03 Injection ← SQL, NoSQL, OS, LDAP, XSS
A04 Insecure Design ← NEW: Missing threat modeling
A05 Security Misconfiguration← Misconfig in cloud/frameworks
A06 Vulnerable Components ← Log4Shell, Struts, outdated libs
A07 Identification & Auth ← Session mgmt, weak passwords
A08 Data Integrity Failures ← NEW: Deserialization, CI/CD
A09 Security Logging Failures← Insufficient monitoring/logging
A10 SSRF ← NEW: Server-Side Request Forgery
══════════════════════════════════════════════════════
A01: Broken Access Control
Users can act outside their intended permissions. Examples include:
- Accessing other users' data by modifying the URL:
/api/user/1234→/api/user/1235(IDOR) - Accessing admin functions as a regular user
- JWT token manipulation to elevate privileges
- CORS misconfiguration allowing cross-origin data access
A02: Cryptographic Failures
- Transmitting sensitive data over HTTP (unencrypted)
- Using weak/outdated algorithms: MD5, SHA-1, DES, RC4
- Hardcoded encryption keys in source code
- Improper certificate validation
A04: Insecure Design
Security cannot be bolted on after the fact. Secure design requires threat modeling during the design phase using frameworks like STRIDE:
STRIDE THREAT MODEL
──────────────────────────────────────────────
S - Spoofing Identity → Authentication controls
T - Tampering with Data → Integrity controls
R - Repudiation → Audit logging, digital signatures
I - Information Disclosure → Confidentiality controls
D - Denial of Service → Availability controls
E - Elevation of Privilege → Authorization controls