logo

OWASP ASVS


Summary

The OWASP Application Security Verification Standard project provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development. The version used in this section is OWASP-ASVS v4.0.3.


Definitions

DefinitionRequirements
ASVS-1_1_1. Secure Software Development Lifecycle
ASVS-1_2_1. Authentication architecture
ASVS-1_2_2. Authentication architecture
ASVS-1_2_3. Authentication architecture
ASVS-1_2_4. Authentication architecture
ASVS-1_4_1. Access control architecture
ASVS-1_5_2. Input and output architecture
ASVS-1_5_3. Input and output architecture
ASVS-1_5_4. Input and output architecture
ASVS-1_6_2. Cryptographic architecture
ASVS-1_6_3. Cryptographic architecture
ASVS-1_6_4. Cryptographic architecture
ASVS-1_7_2. Errors, logging and auditing architecture
ASVS-1_8_2. Data protection and privacy architecture
ASVS-1_9_1. Communications architecture
ASVS-1_9_2. Communications architecture
ASVS-1_12_2. Secure File Upload Architecture
ASVS-1_14_5. Configuration architecture
ASVS-1_14_6. Configuration architecture
ASVS-2_1_1. Password security
ASVS-2_1_2. Password security
ASVS-2_1_3. Password security
ASVS-2_1_4. Password security
ASVS-2_1_5. Password security
ASVS-2_1_6. Password security
ASVS-2_1_7. Password security
ASVS-2_1_8. Password security
ASVS-2_1_9. Password security
ASVS-2_1_10. Password security
ASVS-2_2_1. General authenticator security
ASVS-2_2_2. General authenticator security
ASVS-2_2_3. General authenticator security
ASVS-2_2_4. General authenticator security
ASVS-2_2_6. General authenticator security
ASVS-2_2_7. General authenticator security
ASVS-2_3_1. Authenticator lifecycle
ASVS-2_3_2. Authenticator lifecycle
ASVS-2_4_1. Credential storage
ASVS-2_4_2. Credential storage
ASVS-2_4_3. Credential storage
ASVS-2_4_4. Credential storage
ASVS-2_4_5. Credential storage
ASVS-2_5_1. Credential recovery
ASVS-2_5_2. Credential recovery
ASVS-2_5_3. Credential recovery
ASVS-2_5_4. Credential recovery
ASVS-2_5_5. Credential recovery
ASVS-2_5_6. Credential recovery
ASVS-2_6_1. Look-up secret verifier
ASVS-2_6_2. Look-up secret verifier
ASVS-2_6_3. Look-up secret verifier
ASVS-2_7_1. Out of band verifier
ASVS-2_7_2. Out of band verifier
ASVS-2_7_3. Out of band verifier
ASVS-2_7_4. Out of band verifier
ASVS-2_7_6. Out of band verifier
ASVS-2_8_1. One time verifier
ASVS-2_8_2. One time verifier
ASVS-2_8_3. One time verifier
ASVS-2_8_4. One time verifier
ASVS-2_8_5. One time verifier
ASVS-2_8_6. One time verifier
ASVS-2_8_7. One time verifier
ASVS-2_9_1. Cryptographic verifier
ASVS-2_9_3. Cryptographic verifier
ASVS-2_10_2. Service authentication
ASVS-2_10_3. Service authentication
ASVS-2_10_4. Service authentication
ASVS-3_1_1. Fundamental session management security
ASVS-3_2_1. Session binding
ASVS-3_2_2. Session binding
ASVS-3_2_3. Session binding
ASVS-3_2_4. Session binding
ASVS-3_3_1. Session termination
ASVS-3_3_2. Session termination
ASVS-3_3_3. Session termination
ASVS-3_3_4. Session termination
ASVS-3_4_1. Cookie-based session management
ASVS-3_4_2. Cookie-based session management
ASVS-3_4_3. Cookie-based session management
ASVS-3_4_4. Cookie-based session management
ASVS-3_4_5. Cookie-based session management
ASVS-3_5_2. Token-based session management
ASVS-3_5_3. Token-based session management
ASVS-3_7_1. Defenses against session management exploits
ASVS-4_1_1. General access control design
ASVS-4_1_2. General access control design
ASVS-4_1_3. General access control design
ASVS-4_1_5. General access control design
ASVS-4_2_1. Operation level access control
ASVS-4_2_2. Operation level access control
ASVS-4_3_1. Other access control considerations
ASVS-5_1_1. Input validation
ASVS-5_1_2. Input validation
ASVS-5_1_3. Input validation
ASVS-5_1_4. Input validation
ASVS-5_1_5. Input validation
ASVS-5_2_1. Sanitization and sandboxing
ASVS-5_2_2. Sanitization and sandboxing
ASVS-5_2_3. Sanitization and sandboxing
ASVS-5_2_4. Sanitization and sandboxing
ASVS-5_2_5. Sanitization and sandboxing
ASVS-5_2_6. Sanitization and sandboxing
ASVS-5_2_7. Sanitization and sandboxing
ASVS-5_2_8. Sanitization and sandboxing
ASVS-5_3_1. Output encoding and injection prevention
ASVS-5_3_2. Output encoding and injection prevention
ASVS-5_3_3. Output encoding and injection prevention
ASVS-5_3_4. Output encoding and injection prevention
ASVS-5_3_5. Output encoding and injection prevention
ASVS-5_3_6. Output encoding and injection prevention
ASVS-5_3_7. Output encoding and injection prevention
ASVS-5_3_8. Output encoding and injection prevention
ASVS-5_3_9. Output encoding and injection prevention
ASVS-5_3_10. Output encoding and injection prevention
ASVS-5_4_1. Memory, string, and unmanaged code
ASVS-5_4_2. Memory, string, and unmanaged code
ASVS-5_4_3. Memory, string, and unmanaged code
ASVS-5_5_1. Deserialization prevention
ASVS-5_5_2. Deserialization prevention
ASVS-5_5_3. Deserialization prevention
ASVS-5_5_4. Deserialization prevention
ASVS-6_1_1. Data classification
ASVS-6_1_2. Data classification
ASVS-6_1_3. Data classification
ASVS-6_2_1. Algorithms
ASVS-6_2_2. Algorithms
ASVS-6_2_3. Algorithms
ASVS-6_2_4. Algorithms
ASVS-6_2_5. Algorithms
ASVS-6_2_6. Algorithms
ASVS-6_2_7. Algorithms
ASVS-6_2_8. Algorithms
ASVS-6_3_1. Random values
ASVS-6_3_2. Random values
ASVS-6_3_3. Random values
ASVS-6_4_1. Secret management
ASVS-6_4_2. Secret management
ASVS-7_1_1. Log content
ASVS-7_1_2. Log content
ASVS-7_1_3. Log content
ASVS-7_1_4. Log content
ASVS-7_2_2. Log processing
ASVS-7_2_4. Log processing
ASVS-7_3_1. Log protection
ASVS-7_3_3. Log protection
ASVS-7_3_4. Log protection
ASVS-7_4_1. Error handling
ASVS-7_4_2. Error handling
ASVS-7_4_3. Error handling
ASVS-8_1_1. General data protection
ASVS-8_1_2. General data protection
ASVS-8_1_3. General data protection
ASVS-8_1_4. General data protection
ASVS-8_2_1. Client-side data protection
ASVS-8_3_1. Sensitive private data
ASVS-8_3_2. Sensitive private data
ASVS-8_3_3. Sensitive private data
ASVS-8_3_4. Sensitive private data
ASVS-8_3_5. Sensitive private data
ASVS-8_3_6. Sensitive private data
ASVS-8_3_7. Sensitive private data
ASVS-9_1_1. Client communication security
ASVS-9_1_2. Client communication security
ASVS-9_1_3. Client communication security
ASVS-9_2_1. Server communication security
ASVS-9_2_2. Server communication security
ASVS-9_2_3. Server communication security
ASVS-10_1_1. Code integrity
ASVS-10_2_1. Malicious code search
ASVS-10_2_3. Malicious code search
ASVS-10_2_4. Malicious code search
ASVS-10_2_5. Malicious code search
ASVS-10_2_6. Malicious code search
ASVS-10_3_1. Application integrity
ASVS-10_3_2. Application integrity
ASVS-10_3_3. Application integrity
ASVS-11_1_1. Business logic security
ASVS-11_1_2. Business logic security
ASVS-11_1_3. Business logic security
ASVS-11_1_4. Business logic security
ASVS-12_1_1. File upload
ASVS-12_1_2. File upload
ASVS-12_1_3. File upload
ASVS-12_2_1. File integrity
ASVS-12_3_1. File execution
ASVS-12_3_2. File execution
ASVS-12_3_3. File execution
ASVS-12_3_4. File execution
ASVS-12_3_5. File execution
ASVS-12_3_6. File execution
ASVS-12_4_1. File storage
ASVS-12_4_2. File storage
ASVS-12_5_1. File download
ASVS-12_5_2. File download
ASVS-12_6_1. SSRF protection
ASVS-13_1_1. Generic web service security
ASVS-13_1_3. Generic web service security
ASVS-13_1_5. Generic web service security
ASVS-13_2_1. RESTful web service
ASVS-13_2_2. RESTful web service
ASVS-13_2_3. RESTful web service
ASVS-13_2_5. RESTful web service
ASVS-13_2_6. RESTful web service
ASVS-13_3_1. SOAP web service
ASVS-13_3_2. SOAP web service
ASVS-13_4_1. GraphQL
ASVS-14_1_1. Build and deploy
ASVS-14_1_2. Build and deploy
ASVS-14_1_3. Build and deploy
ASVS-14_1_4. Build and deploy
ASVS-14_1_5. Build and deploy
ASVS-14_2_1. Dependency
ASVS-14_2_2. Dependency
ASVS-14_2_3. Dependency
ASVS-14_2_4. Dependency
ASVS-14_2_5. Dependency
ASVS-14_2_6. Dependency
ASVS-14_3_2. Unintended security disclosure
ASVS-14_3_3. Unintended security disclosure
ASVS-14_4_1. HTTP security headers
ASVS-14_4_2. HTTP security headers
ASVS-14_4_3. HTTP security headers
ASVS-14_4_4. HTTP security headers
ASVS-14_4_5. HTTP security headers
ASVS-14_4_6. HTTP security headers
ASVS-14_4_7. HTTP security headers
ASVS-14_5_1. HTTP request header validation

Last updated

2023/09/18