OWASP Top 10: The Security Risks We Protect Against

OWASP Top 10: The Security Risks We Protect Against

The OWASP (Open Web Application Security Project) Top 10 is the most widely recognised standard for web application security risks. We build protection against all OWASP Top 10 risks into every application we deliver.

The OWASP Top 10 (2021)

  1. Broken Access Control: Users accessing data or functions they should not be able to. We implement strict authorisation checks at every layer.
  2. Cryptographic Failures: Weak or absent encryption of sensitive data. We enforce encryption in transit (HTTPS) and at rest.
  3. Injection: Attackers inserting malicious code (SQL, commands) through input fields. We use parameterised queries and input validation throughout.
  4. Insecure Design: Security not considered in the design phase. We conduct threat modelling before building.
  5. Security Misconfiguration: Default credentials, unnecessary features enabled, verbose error messages. We apply security hardening to all environments.
  6. Vulnerable and Outdated Components: Using libraries with known vulnerabilities. We scan dependencies continuously.
  7. Authentication Failures: Weak passwords, missing MFA, insecure session management. We implement robust authentication patterns.
  8. Software and Data Integrity Failures: Code or updates from untrusted sources. We verify the integrity of dependencies and deployment pipelines.
  9. Security Logging Failures: Insufficient logging to detect and investigate incidents. We implement comprehensive audit logging.
  10. Server-Side Request Forgery (SSRF): Forcing the server to make requests to unintended destinations. We validate and restrict all server-initiated requests.

Did you find this article useful?