This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10-2017 Top 10"
From OWASP
m (added year of release to Top 10-A1..A10) |
m (Fixed A10) |
||
Line 57: | Line 57: | ||
{{Top 10:GrayBoxEnd|year=2017}} | {{Top 10:GrayBoxEnd|year=2017}} | ||
{{Top_10:GradientBox|year=2017}} | {{Top_10:GradientBox|year=2017}} | ||
− | <b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }} | + | <b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }} A10-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}} | A10:2017-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}}]]</u></b> |
: Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. | : Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. | ||
{{Top 10:GrayBoxEnd|year=2017}} | {{Top 10:GrayBoxEnd|year=2017}} |
Revision as of 21:31, 29 December 2017
OWASP Top 10 Application Security Risks - 2017
A3:2017-Sensitive Data Exposure
A4:2017-XML External Entities (XXE)
A6:2017-Security Misconfiguration
A7:2017-Cross-Site Scripting (XSS)
A8:2017-Insecure Deserialization
A9:2017-Using Components with Known Vulnerabilities
A10:2017-Insufficient Logging&Monitoring
|