WSTG - v4.1 - OWASP Foundation
WSTG - v4.1 - OWASP Foundation
Store Donate Join
PROJECTS CHAPTERS Store Donate
Search OWASP Watch 279 Star 5,483
EVENTS ABOUT Join
into monetary terms and quantify the potential cost of 4.2.1 Test Network
Infrastructure Configuration
vulnerabilities to the application owner’s business.
4.2.2 Test Application Platform
Until this happens, CIOs will not be able to develop
Configuration
an accurate return on security investment and, 4.2.3 Test File Extensions
subsequently, assign appropriate budgets for Handling for Sensitive
software security. While estimating the cost of Information
insecure software may appear a daunting task, there 4.2.4 Review Old Backup and
has been a significant amount of work in this Unreferenced Files for
direction. For example, in June 2002, the US Sensitive Information
Unless a holistic approach is adopted, testing just the Information Sent via
Unencrypted Channels
technical implementation of an application will not
4.9.4 Testing for Weak
uncover management or operational vulnerabilities
Encryption
that could be present. By testing the people, policies, 4.10 Business Logic Testing
and processes, an organization can catch issues that 4.10.0 Introduction to Business
would later manifest themselves into defects in the Logic
technology, thus eradicating bugs early and 4.10.1 Test Business Logic
identifying the root causes of defects. Likewise, Data Validation
testing only some of the technical issues that can be 4.10.2 Test Ability to Forge
Cars would not be roll tested, or tested for Unexpected File Types
4.10.9 Test Upload of
stability in emergency maneuvers, brake
Malicious Files
effectiveness, side impact, and resistance
4.11 Client Side Testing
to theft. 4.11.1 Testing for DOM-Based
Cross Site Scripting
Feedback and Comments 4.11.2 Testing for JavaScript
As with all OWASP projects, we welcome comments Execution
and feedback. We especially like to know that our 4.11.3 Testing for HTML
work is being used and that it is effective and Injection
Develop Metrics
An important part of a good security program is the x
This website uses cookies to analyze our traffic and only
ability to determine if things are getting better. It is Accept
share that information with our analytics partners.
important to track the results of testing engagements,
and develop metrics that will reveal the application
security trends within the organization.
Advantages
Threat Modeling
Overview
Threat modeling has become a popular technique to
help system designers think about the security
threats that their systems and applications might
face. Therefore, threat modeling can be seen as risk
assessment for applications. It enables the designer
to develop mitigation strategies for potential
vulnerabilities and helps them focus their inevitably
limited resources and attention on the parts of the
system that most require it. It is recommended that
all applications have a threat model developed and
documented. Threat models should be created as
early as possible in the SDLC, and should be
revisited as the application evolves and development
progresses.
Advantages
Disadvantages
Disadvantages
Penetration Testing
Overview
Penetration testing has been a common technique
used to test network security for many years. It is
also commonly known as black-box testing or ethical
hacking. Penetration testing is essentially the “art” of
testing a running application remotely to find security
vulnerabilities, without knowing the inner workings of
the application itself. Typically, the penetration test
team is able to access an application as if they were
users. The tester acts like an attacker and attempts
to find and exploit vulnerabilities. In many cases the
tester will be given a valid account on the system.
Advantages
Disadvantages
Figure
This 2-4: Proportion
website of Testto
uses cookies Effort According
analyze to Test
our traffic and only x
Technique Accept
share that information with our analytics partners.
A Note about Web Application Scanners
Many organizations have started to use automated
web application scanners. While they undoubtedly
have a place in a testing program, some fundamental
issues need to be highlighted about why it is believed
that automating black-box testing is not (nor will ever
be) completely effective. However, highlighting these
issues should not discourage the use of web
application scanners. Rather, the aim is to ensure the
limitations are understood and testing frameworks
are planned appropriately.
It is helpful to understand the efficacy and limitations
of automated vulnerability detection tools. To this
end, the OWASP Benchmark Project is a test suite
designed to evaluate the speed, coverage, and
accuracy of automated software vulnerability
detection tools and services. Benchmarking can help
to test the capabilities of these automated tools, and
help to make their usefulness explicit.
The following examples show why automated black-
box testing may not be effective.
String magic = “sf8g7sfjdsurtsdieerwqredsgnfg8
d”;
boolean admin = magic.equals( request.getParam
eter(“magic”));
if (admin) doAdmin( request, response);
else … // normal processing
}
Testing Objectives
One of the objectives of security testing is to validate
that security controls operate as expected. This is
documented via security requirements that
describe the functionality of the security control. At a
high level, this means proving confidentiality,
integrity, and availability of the data as well as the
service. The other objective is to validate that
security controls are implemented with few or no
vulnerabilities. These are common vulnerabilities,
such as the OWASP Top Ten, as well as
vulnerabilities that have been previously identified
with security assessments during the SDLC, such as
threat modeling, source code analysis, and
penetration test.
Reporting Requirements
The security posture of an application can be
characterized from the perspective of the effect, such
as number of vulnerabilities and the risk rating of the
vulnerabilities, as well as from the perspective of the
cause or origin, such as coding errors, architectural x
This website uses cookies to analyze our traffic and only
flaws, and configuration issues. Accept
share that information with our analytics partners.
Vulnerabilities can be classified according to different
criteria. The most commonly used vulnerability
severity metric is the Common Vulnerability Scoring
System (CVSS), a standard maintained by the Forum
of Incident Response and Security Teams (FIRST).
Business Cases
For the security test metrics to be useful, they need
to provide value back to the organization’s security
test data stakeholders. The stakeholders can include
project managers, developers, information security
offices, auditors, and chief information officers. The
value can be in terms of the business case that each
project stakeholder has, in terms of role and
responsibility.
Software developers look at security test data to
show that software is coded securely and efficiently.
This allows them to make the case for using source
code analysis tools, following secure coding
standards, and attending software security training.
Edit on GitHub
Spotlight: Fortify x
This website uses cookies to analyze our traffic and only
Accept
share that information with our analytics partners.
Fortify lets you build secure software fast with an application security platform that automates
testing throughout the CI/CD pipeline to enable developers to quickly resolve issues. Fortify static,
dynamic, interactive, and runtime security testing technologies are available on premises or as a
service, offering organizations the flexibility needed to build an end-to-end software security
assurance program.
Corporate Supporters
OWASP, the OWASP logo, and Global AppSec are registered trademarks and AppSec Days, AppSec
California, AppSec Cali, SnowFROC, and LASCON are trademarks of the OWASP Foundation, Inc. Unless
otherwise specified, all content on the site is Creative Commons Attribution-ShareAlike v4.0 and provided
This website uses cookies to analyze our traffic and only x
AcceptDisclaimer. OWASP
without warranty of service or accuracy. For more information, please refer to our General
share that information with our analytics partners.
does not endorse or recommend commercial products or services, allowing our community to remain vendor
neutral with the collective wisdom of the best minds in software security worldwide. Copyright 2023, OWASP
Foundation, Inc.