OWASP presents the draft Top 6 of the main dawn for 2021


OWASP top 6 Web Application Security Web -

The Top 10 list is an extensive guide used on today's web application security threats. The Open Source Web Application Security Project (OWASP) has released its draft Top 10 2021 list that reveals a change in the way it ranks modern threats.  techqueer

The draft report, available online (https://owasp.org/Top10/), contains important changes to the way the nonprofit categorizes current threats from web applications, keeping in mind that the list It has not been updated since 2017.

OWASP has updated the methodology used to generate the Top 10 list. Eight out of 10 categories are data-driven and two have been selected based on industry survey responses.

When the organization analyzes the threat information, provided by cybersecurity companies, there are specific data factors that are used to generate the Top 10 list. These include software and hardware mapping based on Common Weaknesses Enumeration (CWE), the percentage of applications vulnerable to a particular CWE and its impact on organizations.

OWASP takes into account the exploit weight and average metrics of a vulnerability, based on CVSSv2 and CVSSv3 (Common Vulnerability Scoring System) scores, and the total number of applications that have CWEs assigned to CWEs assigned to Total Number of Vulnerabilities and common exposures (CVD) attributable to a particular type of hazard.

Three new categories have been included: "Insecure Design", "Software and Data Integrity Failures" and a group of "Server Side Request Forgery (SSRF)" attacks.

The "External XML Entities (XXE)" category of 2017 becomes part of the "Security misconfiguration" category of 2021. On the other hand, "Cross-Site Scripting (XSS)" has been added to the "Injection" section. and "Insecure deserialization" is now part of "Software and data integrity failures."

OWASP scrolls left

The inclusion of "Insecure Design" and "Software and Data Integrity Failures" shows how the software industry continues to shift to the left (Shifts Left) by focusing more on secure design and architecture as well as how.

“Often times, secure design and threat modeling are overlooked due to the speed of actual development. It is also important to finally see OWASP highlighting software development security and process CI / CD integration as another focus area to keep in mind, ”said Tom Eston, Director of Application Security Practice at Bishop Fox.

Top 6 OWASP: The Complete List

 

1. A01: 2021-Access control interrupted: 34 CWE. Access control vulnerabilities include elevation of privilege, malicious URL modification, access control bypass, incorrect CORS settings, and primary key manipulation.

 


2. A02: 2021-Cryptographic failures: 29 CWE. This includes security flaws when data is in transit or at rest, such as implementation of weak cryptographic algorithms, poor or lax key generation, failure to implement encryption or verify certificates, and transmission of unencrypted data.

3. A03: 2021-Injection: 33 CWE. Common injections affect SQL, NoSQL, LDAP and operating system control, and can be caused by cleanup failures, XSS vulnerabilities, and lack of file path protection.

4. A04: 2021-Unsafe design: 40 CWE. Unsafe design elements vary widely, but OWASP generally describes them as "missing or ineffective control design." Areas of concern include the lack of protection of stored data, problems with logic programming, and the display of content that reveals sensitive information.

5. A05: 2021-Incorrect security settings: 20 CWE. Applications can be considered vulnerable if they lack security hardening, if there are unnecessary features such as an open hand when it comes to privileges, if default accounts are kept active, and if there are security features that are not configured correctly.

6. A06: 2021-Vulnerable and obsolete components: three CWEs. This category focuses on client-side and server-side components, component maintenance failures,

Comments

Popular posts from this blog

The challenge for companies in 2021, Data protection and Cybersecurity Privacy

Embedded systems: examples of human use

follow. it, the alternative to Feedburner to have more recurring readers Meal