Well-Architected
OWASP Top 10
Start Free
OWASP Top 10
The OWASP Top 10 is a standard awareness framework for developers and web application security.
A01-2021 - Broken Access Control
Broken access control vulnerabilities arise when an application fails to properly enforce restrictions on what authenticated users are allowed to do. Attackers can exploit broken access controls to gain unauthorized access to sensitive functions and data, such as viewing other users' private information or modifying data.
6
Find out more
A02-2021 - Cryptographic Failures
Cryptographic failures occur when cryptographic algorithms or protocols are used incorrectly, leading to security vulnerabilities. Common cryptographic failures include weak key management, insecure random number generation, and improper usage of cryptographic functions.
5
Find out more
A03-2021 - Injection
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
6
Find out more
A04-2021 - Insecure Design
Insecure design refers to flaws in the overall design of an application or system that create security vulnerabilities. These flaws may include inadequate threat modeling, lack of secure architecture, or failure to consider security requirements during the design phase.
10
Find out more
A05-2021 - Security Misconfiguration
Security misconfiguration occurs when security settings are not implemented or are configured incorrectly. This can happen at any level of an application stack, including the web server, application server, database, platform, or framework. Attackers can exploit security misconfigurations to gain unauthorized access, escalate privileges, and execute arbitrary code.
6
Find out more
A06-2021 - Vulnerable and Outdated Components
Vulnerable and outdated components refer to the use of third-party libraries, frameworks, or software components that contain known security vulnerabilities or are not up-to-date with security patches. Attackers can exploit these vulnerabilities to compromise the security of the application.
2
Find out more
A07-2021 - Identification and Authentication Failures
Identification and authentication failures occur when an application fails to properly verify the identity of users or fails to adequately authenticate users before granting access to sensitive functionality or data. Attackers can exploit identification and authentication failures to gain unauthorized access to the application.
3
Find out more
A08-2021 - Software and Data Integrity Failures
Software and data integrity failures occur when an application fails to properly validate and protect the integrity of data throughout its lifecycle. This can include failure to detect unauthorized changes to data, improper handling of input data, or lack of sufficient data validation.
4
Find out more
A09-2021 - Security Logging and Monitoring Failures
Security logging and monitoring failures refer to the lack of adequate mechanisms for recording and monitoring security events within an application or environment. Without proper logging and monitoring, attackers can operate undetected, making it difficult to detect security breaches, investigate incidents, and respond effectively to threats.
1
Find out more
A10-2021 - Server Side Request Forgery (SSRF)
Server Side Request Forgery (SSRF) vulnerabilities occur when an attacker can manipulate the requests sent by an application to access resources on the server's internal network or other external systems. Attackers can exploit SSRF vulnerabilities to bypass access controls, access sensitive data, or perform unauthorized actions.
0
Find out more
Is your Salesforce solution exposed to any of the OWASP Top 10?
Clayton detects exposures and offers automated fix advice to harden your solution fast.
Scan your solution