logo

Database

OWASP TOP 10

Last updated: 2023/09/18
logo

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. The version used in this section is OWASP Top 10:2021.

Control-Requirement Mapping

DefinitionRequirements
A1. Broken access control
A2. Cryptographic failures
A3. Injection
A4. Insecure design
A5. Security misconfiguration
A6. Vulnerable and outdated components
A7. Identification and authentication failures
A8. Software and data integrity failures
A9. Security logging and monitoring failures
A10. Server-side request forgery