This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10-2017 Introduction"

From OWASP
Jump to: navigation, search
m (T.Gigler moved page Top 10 2017-Introduction to Top 10-2017 Introduction: Prepare OWASP Top 10-2017 Release)
(Prepare OWASP Top 10-2017 Release (Content))
Line 1: Line 1:
 
{{Top_10_2013:TopTemplate
 
{{Top_10_2013:TopTemplate
     |usenext=2013NextLink
+
     |useprev=2017PrevLink
     |next={{Top_10:LanguageFile|text=releaseNotes|language=en|year=2017}}
+
     |prev={{Top_10:LanguageFile|text=foreword|year=2017|language=en}}
     |useprev=2013PrevLink
+
     |usenext=2017NextLink
     |prev={{Top_10:LanguageFile|text=aboutOWASP|language=en|year=2017}}
+
     |next={{Top_10:LanguageFile|text=releaseNotes|year=2017|language=en}}
 
     |year=2017
 
     |year=2017
 
     |language=en
 
     |language=en
 
}}
 
}}
 +
<!--- I Introduction --->
 +
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title=Welcome to the OWASP Top 10 - 2017|year=2017|language=en}}
 +
This major update adds several new issues, including two issues selected by the community - A8:2017-Insecure Deserialization and A10:2017-Insufficient Logging and Monitoring. Two key differentiators from previous OWASP Top 10 releases are the substantial community feedback and extensive data assembled from dozens of organizations, possibly the largest amount of data ever assembled in the preparation of an application security standard. This provides us with confidence that the new OWASP Top 10 addresses the most impactful application security risks currently facing organizations.
  
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title={{Top_10:LanguageFile|text=welcome|language=en}}|year=2017|language=en}}
+
The OWASP Top 10 for 2017 is based primarily on 40+ data submissions from firms that specialize in application security and an industry survey that was completed by over 500 individuals. This data spans vulnerabilities gathered from hundreds of organizations and over 100,000 real-world applications and APIs. The Top 10 items are selected and prioritized according to this prevalence data, in combination with consensus estimates of exploitability, detectability, and impact.
Welcome to the OWASP Top 10 2017! This major update adds two new vulnerability categories for the first time: (1) Insufficient
 
Attack Detection and Prevention and (2) Underprotected APIs. We made room for these two new categories by merging the two
 
access control categories (2013-A4 and 2013-A7) back into Broken Access Control (which is what they were called in the OWASP
 
Top 10 - 2004), and dropping 2013-A10: Unvalidated Redirects and Forwards, which was added to the Top 10 in 2010.
 
  
The OWASP Top 10 for 2017 is based primarily on 11 large datasets from firms that specialize in application security, including 8
+
A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web application security weaknesses. The Top 10 provides basic techniques to protect against these high risk problem areas, and provides guidance on where to go from here.
consulting companies and 3 product vendors. This data spans vulnerabilities gathered from hundreds of organizations and over
 
50,000 real-world applications and APIs. The Top 10 items are selected and prioritized according to this prevalence data, in
 
combination with consensus estimates of exploitability, detectability, and impact.
 
  
The primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the
+
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=left|title=Roadmap for future activities|year=2017|language=en}}
consequences of the most important web application security weaknesses. The Top 10 provides basic techniques to protect
+
<b>Don't stop at 10</b>. There are hundreds of issues that could affect the overall security of a web application as discussed in the <u>[[OWASP_Guide_Project|OWASP Developer's Guide]]</u> and the <u>[[:Category:Cheatsheets|OWASP Cheat Sheet Series]]</u>. These are essential reading for anyone developing web applications and APIs. Guidance on how to effectively find vulnerabilities in web applications and APIs is provided in the <u>[[OWASP_Testing_Project|OWASP Testing Guide]]</u>.
against these high risk problem areas – and also provides guidance on where to go from here.
 
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=left|title={{Top_10:LanguageFile|text=warnings|language=en}}|year=2017|language=en}}
 
  
'''Don’t stop at 10.''' There are hundreds of issues that could affect the overall security of a web application as discussed in the <u>[[OWASP_Guide_Project| OWASP Developer’s Guide]]</u> and the <u>[[Cheat_Sheets| OWASP Cheat Sheet Series]]</u>. These are essential reading for anyone developing web applications. Guidance on how to effectively find vulnerabilities in web applications is provided in the <u>[[Category:OWASP_Testing_Project| OWASP Testing Guide]]</u> and the <u>[[Category:OWASP_Code_Review_Project| OWASP Code Review Guide]]</u>.
+
<b>Constant change</b>. The OWASP Top 10 will continue to change. Even without changing a single line of your application's code, you may become vulnerable as new flaws are discovered and attack methods are refined. Please review the advice at the end of the Top 10 in What's Next For Developers, Testers, Organizations and Application Managers for more information.
  
'''Constant change.''' This Top 10 will continue to change. Even without changing a single line of your application’s code, you may become vulnerable as new flaws are discovered and attack methods are refined. Please review the advice at the end of the Top 10 in “What’s Next For Developers, Verifiers, and Organizations” for more information.
+
<b>Think positive</b>. When you're ready to stop chasing vulnerabilities and focus on establishing strong application security controls, the <u>[[OWASP_Proactive_Controls|OWASP Proactive Controls]]</u> project provides a starting point to help developers build security into their applications and the <u>[[ASVS|OWASP Application Security Verification Standard (ASVS)]]</u> is a guide for organizations and application reviewers on what to verify.
  
'''Think positive.''' When you’re ready to stop chasing vulnerabilities and focus on establishing strong application security controls, OWASP has produced the <u>[[ASVS| Application Security Verification Standard (ASVS)]]</u> as a guide to organizations and application reviewers on what to verify.
+
<b>Use tools wisely</b>. Security vulnerabilities can be quite complex and deeply buried in code. In many cases, the most cost-effective approach for finding and eliminating these weaknesses is human experts armed with advanced tools. Relying on tools alone provides a false sense of security and is not recommended.
  
'''Use tools wisely.''' Security vulnerabilities can be quite complex and buried in mountains of code. In many cases, the most cost-effective approach for finding and eliminating these weaknesses is human experts armed with good tools.
+
<b>Push left, right, and everywhere</b>. Focus on making security an integral part of your culture throughout your development organization. Find out more in the <u>[[OWASP_SAMM_Project|OWASP Software Assurance Maturity Model (SAMM)]]</u>.
  
'''Push left, right, and everywhere.''' Focus on making security an integral part of your culture throughout your development organization. Find out more in the <u>[[Category:Software_Assurance_Maturity_Model| Open Software Assurance Maturity Model (SAMM)]]</u> and the <u>[http://ruggedsoftware.org/  Rugged Handbook]</u>.
+
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=right|title=Attribution|year=2017|language=en}}
 +
We'd like to thank the organizations that contributed their vulnerability data to support the 2017 update. We received more than 40 responses to the call for data. For the first time, all the data contributed to a Top 10 release, and the full list of contributors, is publicly available. We believe this is one of the larger, more diverse collections of vulnerability data ever collected publicly.
  
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=right|title={{Top_10:LanguageFile|text=attribution|language=en}}|year=2017|language=en}}
+
As there are more contributors than space here, we have created a dedicated page to recognize the contributions made. We wish to give heartfelt thanks to these organizations for being willing to be on the front lines by publicly sharing vulnerability data from their efforts. We hope this will continue to grow and encourage more organizations to do the same and possibly be seen as one of the key milestones of evidence based security. The OWASP Top 10 would not be possible without these amazing contributions. 
Thanks to <u>[https://www.aspectsecurity.com/ Aspect Security]</u> for initiating, leading, and updating
 
the OWASP Top 10 since its inception in 2003, and to its
 
primary authors: Jeff Williams and Dave Wichers.
 
  
<center>
+
A big thank you to the more than 500 individuals who took the time to complete the industry ranked survey. Your voice helped determine two new additions to the Top 10. The additional comments, notes of encouragement, and criticisms were all appreciated. We know your time is valuable and we wanted to say thanks.
<u>[https://www.aspectsecurity.com https://www.owasp.org/images/5/51/Aspect_Logo.png]</u>
 
</center>
 
  
We’d like to thank the many organizations that contributed
+
We would like to thank those individuals who contributed significant constructive comments and time reviewing this update to the Top 10. As much as possible, we have listed them on the "[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017}}_{{Top_10:LanguageFile|text=acknowledgements|language=en}}|{{Top_10:LanguageFile|text=acknowledgements|language=en}}]]" page.
their vulnerability prevalence data to support the 2017
 
update, including these large data set providers:
 
<ul style="columns: 2; -webkit-columns: 2; -moz-columns: 2;">
 
<li><u>[https://www.aspectsecurity.com/ Aspect Security]</u></li>
 
<li><u>[http://www.brandingbrand.com/ Branding Brand]</u></li>
 
<li><u>[https://www.edgescan.com/ EdgeScan]</u></li>
 
<li><u>[https://www.mindedsecurity.com/ Minded Security]</u></li>
 
<li><u>[http://www.softtek.com/ Softtek]</u></li>
 
<li><u>[http://www.vantagepoint.sg/ Vantage Point]</u></li>
 
<li><u>[https://www.astechconsulting.com/ AsTech Consulting]</u></li>
 
<li><u>[https://www.contrastsecurity.com/ Contrast Security]</u></li>
 
<li><u>[https://www.ibliss.com.br/ iBLISS]</u></li>
 
<li><u>[https://www.paladion.net/ Paladion Networks]</u></li>
 
<li><u>[https://www.sonatype.com/ Sonatype]</u></li>
 
<li><u>[https://www.veracode.com/ Veracode]</u></li>
 
</ul>
 
  
For the first time, all the data contributed to a Top 10 release,
+
And finally, we'd like to thank in advance all the translators out there who will translate this release of the Top 10 into numerous different languages, helping to make the OWASP Top 10 more accessible to the entire planet.
and the full list of contributors, is <u>[https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true publicly available]</u>.
 
 
 
We would like to thank in advance those who contribute
 
significant constructive comments and time reviewing this
 
update to the Top 10 and to:
 
<ul>
 
  <li><u>[mailto:[email protected] Neil Smithline]</u> (<u>[https://www.autodesk.com Autodesk]</u>) – For producing the wiki version of this Top 10 release</li>
 
</ul>
 
And finally, we’d like to thank in advance all the translators out
 
there that will translate this release of the Top 10 into
 
numerous different languages, helping to make the OWASP
 
Top 10 more accessible to the entire planet
 
  
 
{{Top_10_2013:BottomAdvancedTemplate
 
{{Top_10_2013:BottomAdvancedTemplate
     |type={{Top_10_2010:StyleTemplate}}
+
     |type=box
     |usenext=2013NextLink
+
    |useprev=2017PrevLink
 +
    |prev={{Top_10:LanguageFile|text=foreword|year=2017|language=en}}
 +
     |usenext=2017NextLink
 
     |next={{Top_10:LanguageFile|text=releaseNotes|year=2017|language=en}}
 
     |next={{Top_10:LanguageFile|text=releaseNotes|year=2017|language=en}}
    |useprev=2013PrevLink
 
    |prev={{Top_10:LanguageFile|text=aboutOWASP|year=2017|language=en}}
 
 
     |year=2017
 
     |year=2017
 
     |language=en
 
     |language=en
 
}}
 
}}
 +
 +
<!-- [[Category:OWASP Top Ten Project]] -->

Revision as of 23:41, 16 December 2017

← Foreword
2017 Table of Contents

PDF version

Release Notes →
Welcome to the OWASP Top 10 - 2017

This major update adds several new issues, including two issues selected by the community - A8:2017-Insecure Deserialization and A10:2017-Insufficient Logging and Monitoring. Two key differentiators from previous OWASP Top 10 releases are the substantial community feedback and extensive data assembled from dozens of organizations, possibly the largest amount of data ever assembled in the preparation of an application security standard. This provides us with confidence that the new OWASP Top 10 addresses the most impactful application security risks currently facing organizations.

The OWASP Top 10 for 2017 is based primarily on 40+ data submissions from firms that specialize in application security and an industry survey that was completed by over 500 individuals. This data spans vulnerabilities gathered from hundreds of organizations and over 100,000 real-world applications and APIs. The Top 10 items are selected and prioritized according to this prevalence data, in combination with consensus estimates of exploitability, detectability, and impact.

A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web application security weaknesses. The Top 10 provides basic techniques to protect against these high risk problem areas, and provides guidance on where to go from here.

Roadmap for future activities

Don't stop at 10. There are hundreds of issues that could affect the overall security of a web application as discussed in the OWASP Developer's Guide and the OWASP Cheat Sheet Series. These are essential reading for anyone developing web applications and APIs. Guidance on how to effectively find vulnerabilities in web applications and APIs is provided in the OWASP Testing Guide.

Constant change. The OWASP Top 10 will continue to change. Even without changing a single line of your application's code, you may become vulnerable as new flaws are discovered and attack methods are refined. Please review the advice at the end of the Top 10 in What's Next For Developers, Testers, Organizations and Application Managers for more information.

Think positive. When you're ready to stop chasing vulnerabilities and focus on establishing strong application security controls, the OWASP Proactive Controls project provides a starting point to help developers build security into their applications and the OWASP Application Security Verification Standard (ASVS) is a guide for organizations and application reviewers on what to verify.

Use tools wisely. Security vulnerabilities can be quite complex and deeply buried in code. In many cases, the most cost-effective approach for finding and eliminating these weaknesses is human experts armed with advanced tools. Relying on tools alone provides a false sense of security and is not recommended.

Push left, right, and everywhere. Focus on making security an integral part of your culture throughout your development organization. Find out more in the OWASP Software Assurance Maturity Model (SAMM).

Attribution

We'd like to thank the organizations that contributed their vulnerability data to support the 2017 update. We received more than 40 responses to the call for data. For the first time, all the data contributed to a Top 10 release, and the full list of contributors, is publicly available. We believe this is one of the larger, more diverse collections of vulnerability data ever collected publicly.

As there are more contributors than space here, we have created a dedicated page to recognize the contributions made. We wish to give heartfelt thanks to these organizations for being willing to be on the front lines by publicly sharing vulnerability data from their efforts. We hope this will continue to grow and encourage more organizations to do the same and possibly be seen as one of the key milestones of evidence based security. The OWASP Top 10 would not be possible without these amazing contributions. 

A big thank you to the more than 500 individuals who took the time to complete the industry ranked survey. Your voice helped determine two new additions to the Top 10. The additional comments, notes of encouragement, and criticisms were all appreciated. We know your time is valuable and we wanted to say thanks.

We would like to thank those individuals who contributed significant constructive comments and time reviewing this update to the Top 10. As much as possible, we have listed them on the "Acknowledgements" page.

And finally, we'd like to thank in advance all the translators out there who will translate this release of the Top 10 into numerous different languages, helping to make the OWASP Top 10 more accessible to the entire planet.

← Foreword
2017 Table of Contents

PDF version

Release Notes →

© 2002-2017 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png