This article is based on ‘Top 10 Biggest Security Threats to Your Products,’ a webinar hosted by Mike Burch, Security Journey’s Director of Application Security.
The OWASP Top 10 for web application security risks is the most well-known OWASP list, but did you know there are at least eight other "top ten" lists in the OWASP universe? As security professionals, it's important to comprehensively understand new technologies and the associated application security issues with each type of tech.
Mike Burch and his team took the time to evaluate these lists and compile what we believe is a list to rule them all – the biggest threats to our products across the different technologies.
Top Ten Lists are created primarily to educate people on the most common and important security concepts for a given technology. They play a crucial role in ensuring that teams across the industry have a shared understanding of threats and generalized strategies to mitigate them.
Read More: The Value of Security Education for Developers
There are many similarities between the issues we face across application and product security. That is why you will often see overlap across the top ten lists within the industry. We hope that the Top Ten Master List can be used by anyone building products to gain a better understanding of the different security threats and mitigation strategies they should take.
Let’s Dive In!
Lists Included: Web Apps, IoT, Mobile, Docker, API, Embedded
Allowing products to go out without being hardened or secured. One of the most significant issues is that organizations pull a product out of the box without changing the defaults. These defaults will be wide open to attacks. This top ten item includes insecure default configurations on operating systems, frameworks, libraries, and applications and a lack of implementation of environmental security guidelines.
Mitigation strategies include:
Lists Included: Web Apps, IoT, Mobile, Docker, API, Embedded
This is not about the authorization (what I’m allowed to do); it’s about the authentication (who I am), so this list item is about breaking into a system by pretending to be someone I’m not, including incorrect implementation of authentication application functions and session management.
Mitigation strategies include:
Lists Included: Web Apps, IoT, Mobile, Docker, API, Embedded
This deals with unneeded insecure network services and things that allow remote control on a system, the vulnerable exchange of data between clients and servers, the assumption of trust between resources on the network, and side-channel vulnerabilities.
Mitigation strategies include:
Lists Included: Web Apps, IoT, Mobile, Docker, Embedded
When we have sensitive data, we have to ensure those who shouldn’t have access don’t have access.
This top eleven item includes improperly protecting sensitive data, such as financial, healthcare, and PII, while in use, at rest, and in transit.
Mitigation strategies include:
Lists Included: Web Apps, IoT, Mobile, Docker, Embedded
This encompasses all of our software supply chain vulnerabilities, such as libraries, frameworks, and other software modules used within an existing system and containing known vulnerabilities.
Mitigation strategies include:
Lists Included: Web Apps, Mobile, API, Embedded
When someone wants to do something in my system, I should be doing check to make sure you should be in the system. A lack of adequate enforcement of authenticated user activity restrictions allowing access to unauthorized user and admin functionality and data.
Mitigation strategies include:
Lists Included: Web Apps, IoT, Docker, Embedded
This goes back to maintaining a system to keep it as secure as the date it was created, but also in the future. This can range from a lack of ability to patch—security vulnerabilities to compromised software in the update chain.
Mitigation strategies include:
Lists Included: Web Apps, Mobile, Embedded
This top ten item includes many items, including command injection, SQLi, XSS, XXE, insecure deserialization, and business logic exploits from input that is not validated before being put into the system.
Mitigation strategies include:
Lists Included: Docker, API, Embedded
The lack of capability to handle large amounts of attack traffic or requests, manipulation of an interface to return unreasonable amounts of data, and the usage of a given security feature multiple times with no limitations or the exhaustion of resources.
Mitigation strategies include:
Lists Included: Web Apps, Docker, API
Logging and exceptions cover properly tracking what is happening in your system. These limitations allow attackers to attack systems further, maintain persistence, pivot to more systems, and tamper, extract, or destroy data without knowledge from a security operations center or the developers.
Mitigation strategies include:
By creating this master top ten list, we hope to continue to embrace the commonalities and work to secure your products and apps, regardless of where they fall on the technology spectrum.
You can learn more about our recommended mitigation strategies from Mike Burch on his webinar – Top 10 Biggest Security Threats to Your Products. You can teach mitigation strategies with Security Journey’s enterprise-class application security training content; learn more today.