This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

What Are the Mitigation for All Owasp Top 10 Vulnerabilities?

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Question → https://www.quora.com/What-are-the-mitigation-for-all-owasp-top-10-vulnerabilities

 

Answer → https://docs.google.com/document/d/1-hxo9FMQCR5vr9bo8rLxnklrvkxaOBs5QhijOeg014s/edit

What Are the Mitigation for All Owasp Top 10 Vulnerabilities?

With the growing number of applications and the sophistication of hackers, organizations must stay vigilant on security vulnerabilities. It’s also important to know how to mitigate them.

To this end, the Open Web Application Security Project (OWASP) helps organizations develop, operate, and maintain secure and trusted applications. Their projects, tools, chapters, and forums can help one improve the security of applications.

For example, they have a top ten list of mobile application security risks aimed at helping mobile app developers produce secure code.

They also have the top ten web application security risks that one can mitigate.

They include:

  1. Injection

These include SQL, LDAP, and code injection. These attacks allow manipulated or untrusted queries or commands to be executed on the app.

Mitigation

Use a vetted framework or library that prevents these attacks from happening. Input validation, use a safe API, and ensure the app runs with minimum privileges.

  1. Broken Authentication and Session Management

It allows the attacker to bypass authentication on the web application.

Mitigation

Enable encryption on requests with sensitive data and have a strong password policy for users.

  1. Sensitive Data Exposure

Failure to protect sensitive data can provide hackers with an opportunity to steal or modify the data for identity theft, card fraud, etc.

Mitigation

Encrypt data while in transit or at rest, use up to date security certificates, and encrypt stored passwords.

  1. XML External Entities (XXE)

Attackers exploit vulnerable XML processors using vulnerable code or by adding hostile content to XML documents.

Mitigation

Upgrade or patch all XML libraries and processors used by the application. Use less complex data formats, and don’t serialize sensitive data.

  1. Broken Access Control

Not enforcing restrictions on authenticated users can allow attackers to access unauthorized data.

Mitigation

Implement a robust access control, log access control failures, and invalidate JSON Web Tokens (JWT) after logout.

  1. Security Misconfiguration

Attackers access the system by exploiting insecure or incomplete configurations, unprotected files, unpatched flaws, etc.

Mitigation

Securely configure all frameworks, libraries, operating systems, and apps. You should also review and update all security updates, patches, and notes.

  1. Cross-Site Scripting XSS

XSS allows an attacker to execute code on the victim’s browser, hijack user sessions, redirect users to malicious sites, or deface web sites.

Mitigation

Use frameworks that escape XSS by design automatically and escape untrusted HTTP requests. Apply context-sensitive encoding techniques when modifying a client-side document against DOM XSS.

  1. Insecure Deserialization

It leads to remote code execution. Attackers use it for injection attacks, replay attacks, and privilege escalation attacks.

Mitigation

Do not accept serialized objects from untrusted sources.

  1. Using Components with Known Vulnerabilities

Attackers exploit known vulnerabilities in frameworks, libraries, and other software modules running with the same privileges as the app.

Mitigation

Have a patch management process for frameworks and libraries and only obtain components from trusted sources.

  1. Insufficient logging and monitoring

Attackers leverage the lack of monitoring and timely responses to exploit systems.

Mitigation

Log all access control, login, and server-side input validation failures with sufficient user context. Hold them for the time necessary to identify suspicious accounts and allow for delayed forensic analysis.

To get a detailed look at how you can mitigate these vulnerabilities, check out theOWASP website.

I hope this helps

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask