logo

Database

CASA

Last updated: 2023/09/18
logo

The Cloud Application Security Assessment (CASA) has built upon the industry-recognized standards of the OWASP's Application Security Verification Standard (ASVS) to provide a consistent set of requirements to harden security for any application.

Control-Requirement Mapping

DefinitionRequirements
1_2_2. Authentication Architecture
1_2_3. Authentication Architecture
1_4_1. Access Control Architecture
1_4_4. Access Control Architecture
1_5_2. Input and Output Architecture
1_5_3. Input and Output Architecture
1_5_4. Input and Output Architecture
1_8_2. Data Protection and Privacy Architecture
1_9_1. Communications Architecture
1_11_3. Communications Architecture
1_14_1. Configuration Architecture
1_14_2. Configuration Architecture
1_14_3. Configuration Architecture
1_14_4. Configuration Architecture
1_14_5. Configuration Architecture
1_14_6. Configuration Architecture
2_2_1. General Authenticator Security
2_2_4. General Authenticator Security
2_2_5. General Authenticator Security
2_3_1. Authenticator Lifecycle
2_4_1. Credential Storage
2_4_3. Credential Storage
2_4_5. Credential Storage
2_6_1. Look-up Secret Verifier
2_7_2. Out of Band Verifier
2_7_3. Out of Band Verifier
2_7_4. Out of Band Verifier
2_7_5. Out of Band Verifier
2_7_6. Out of Band Verifier
2_8_2. One Time Verifier
2_8_5. One Time Verifier
2_8_6. One Time Verifier
2_9_1. Cryptographic Verifier
2_9_3. Cryptographic Verifier
2_10_1. Service Authentication
2_10_2. Service Authentication
2_10_3. Service Authentication
2_10_4. Service Authentication
3_2_3. Session Binding
3_3_1. Session Termination
3_3_3. Session Termination
3_3_4. Session Termination
3_4_1. Cookie-based Session Management
3_4_2. Cookie-based Session Management
3_4_3. Cookie-based Session Management
3_5_1. Token-based Session Management
3_5_2. Token-based Session Management
3_5_3. Token-based Session Management
3_7_1. Defenses Against Session Management Exploits
4_1_1. General Access Control Design
4_1_2. General Access Control Design
4_1_3. General Access Control Design
4_1_5. General Access Control Design
4_2_2. Operation Level Access Control
4_3_1. Other Access Control Considerations
4_3_2. Other Access Control Considerations
4_3_3. Other Access Control Considerations
5_1_1. Input Validation
5_1_2. Input Validation
5_1_3. Input Validation
5_1_4. Input Validation
5_1_5. Input Validation
5_2_3. Sanitization and Sandboxing
5_2_4. Sanitization and Sandboxing
5_2_5. Sanitization and Sandboxing
5_2_6. Sanitization and Sandboxing
5_2_7. Sanitization and Sandboxing
5_3_1. Output Encoding and Injection Prevention
5_3_2. Output Encoding and Injection Prevention
5_3_3. Output Encoding and Injection Prevention
5_3_4. Output Encoding and Injection Prevention
5_3_6. Output Encoding and Injection Prevention
5_3_7. Output Encoding and Injection Prevention
5_3_8. Output Encoding and Injection Prevention
5_3_9. Output Encoding and Injection Prevention
5_3_10. Output Encoding and Injection Prevention
5_5_1. Deserialization Prevention
5_5_2. Deserialization Prevention
6_1_1. Data Classification
6_1_2. Data Classification
6_1_3. Data Classification
6_2_1. Algorithms
6_2_2. Algorithms
6_2_3. Algorithms
6_2_4. Algorithms
6_2_5. Algorithms
6_2_6. Algorithms
6_2_7. Algorithms
6_2_8. Algorithms
6_3_1. Random Values
6_3_2. Random Values
6_3_3. Random Values
6_4_2. Secret Management
7_1_1. Log Content
7_1_2. Log Content
7_1_3. Log Content
7_3_1. Log Protection
7_3_3. Log Protection
8_1_1. General Data Protection
8_1_3. General Data Protection
8_1_6. General Data Protection
8_2_1. Client-side Data Protection
8_2_2. Client-side Data Protection
8_3_1. Sensitive Private Data
8_3_2. Sensitive Private Data
8_3_3. Sensitive Private Data
8_3_5. Sensitive Private Data
8_3_6. Sensitive Private Data
8_3_8. Sensitive Private Data
9_1_2. Client Communication Security
9_1_3. Client Communication Security
9_2_1. Server Communication Security
9_2_4. Server Communication Security
9_2_5. Server Communication Security
10_1_1. Code Integrity
10_2_3. Malicious Code Search
10_2_4. Malicious Code Search
10_2_5. Malicious Code Search
10_3_2. Application Integrity
10_3_3. Application Integrity
11_1_4. Business Logic Security
12_4_1. File Storage
12_4_2. File Storage
13_1_1. Generic Web Service Security
13_1_3. Generic Web Service Security
13_1_4. Generic Web Service Security
13_2_1. RESTful Web Service
14_1_1. Build and Deploy
14_1_4. Build and Deploy
14_1_5. Build and Deploy
14_2_1. Dependency
14_3_2. Unintended Security Disclosure
14_5_2. HTTP Request Header Validation