SKILL of System Security Vulnerability
  • 주요정보통신기반시설 기술적 취약점 분석 평가 방법 상세가이드
    • Unix 시스템 취약점 진단 분석 평가 방법
    • Windows 시스템 취약점 진단 분석 평가 방법
    • IPS/IDS/VPN/Anti-DDoS/WEB-FW 취약점 진단 분석 평가 방법
    • 네트워크장비 취약점 진단 분석 평가 방법
    • 제어시스템 취약점 진단 분석 평가 방법
    • PC 취약점 진단 분석 평가 방법
    • DBMS 취약점 진단 분석 평가 방법
    • WEB(웹) 취약점 진단 분석 평가 방법
    • 이동통신(Telecommunication) 시스템 취약점 진단 분석 평가 방법
    • 클라우드(Cloud) 시스템 취약점 진단 분석 평가 방법
    • 주요정보통신기반시설 취약점 분석·평가 기준
    • [KISA] 주요정보통신기반시설 기술적 취약점 분석ㆍ평가 방법 상세가이드 (Download)
  • [KISA] 내PC돌보미 - PC 보안 가이드 [취약점 관리(Windows/Mac)]
    • [KISA] 내PC돌보미 - PC 보안 가이드 [취약점 관리(Windows)]
    • [KISA] 내PC돌보미 - PC 보안 가이드 [취약점 관리(Mac)]
  • [KISA] 내PC돌보미 - Mobile 보안 가이드 [취약점 관리]
    • [KISA] 모바일 보안 안내서 다운로드
  • OWASP Top 10
    • OWASP Top 10 Vulnerabilities 2023
    • OWASP Top 10 API security risks 2023
  • KISA Academy [KISA 사이버보안인재센터] 교육 정보
    • [KISA IoT 보안테스트베드] 시큐어코딩
    • [과학기술정보통신부] 온라인 일방향 침해사고 대응 훈련(중급, 스피어 피싱 대응 - 기본과정)
    • [고용노동부] K-Shield 모의해킹 훈련
    • [고용노동부] K-Shield 1차 교육훈련(화요일반/악성코드 분석 심화과정 연계)
    • [고용노동부] K-Shield 1차 교육훈련(수요일반/디지털포렌식 심화과정 연계)
    • [고용노동부] K-Shield 1차 교육훈련(목요일반/모의해킹 심화과정 연계)
Powered by GitBook
On this page
  • OWASP Top 10 Vulenerbilities 2023
  • 1. Broken Access Control
  • 2. Cryptographic Failures
  • 3. Injection
  • 4. Insecure Design
  • 5. Security Misconfiguration
  • 6. Vulnerable and Outdated Components
  • 7. Identification and Authentication Failures
  • 8. Software and Data Integrity Failures
  • 9. Security Logging and Monitoring
  • 10. Server-Side Request Forgery
  • 출처 : OWASP
  1. OWASP Top 10

OWASP Top 10 Vulnerabilities 2023

OWASP 사이트 참고

OWASP Top 10 Vulenerbilities 2023

OWASP releases its standard document OWASP top 10 stating the most critical security risks for web applications. Many organizations rely on this document for ensuring minimum risk to their web applications.

OWASP (Open Web Application Security Project) is a non-profit organization whose work is focused on improving software security. It finds most dangerous security threats to web applications and rank them according to their frequency of occurrence and severity of impact. These are the OWASP top 10 vulnerabilities 2023 that every web and application developers should look out before proceeding with the development.

  1. Broken Access Control

  2. Cryptographic Failures

  3. Injection

  4. Insecure Design

  5. Security Misconfiguration

  6. Vulnerable and Outdated Components

  7. Identification and Authentication Failures

  8. Software and Data Integrity Failures

  9. Security Logging and Monitoring

  10. Server-Side Request Forgery

1. Broken Access Control

During app development, access controls are applied that prohibit users from retrieving the information out of their given permission. Failure to perform efficiently can lead to unauthorized information disclosure, data modification, destruction of all data and many other damages. When an application evolves with time and numerous features are loaded to it, failure can occur and this can result in fallout for the application’s security. Broken Access Control in any application or website must be prevented at all cost.

It is among the commonly faced OWASP 2023 vulnerabilities.

2. Cryptographic Failures

Poor use of cryptography and algorithm are responsible for a series of threats that are known as Cryptographic failures. It is important to use encrypted connections to application like SFTP, HTTPS, SSH, etc while carrying out any configuration or code changes. This vulnerability can expose sensitive data such as passwords, business records, credit card information, email addresses, patient health records, or other personal user data. To prevent this, all data should be stored with the recommended hashing algorithms.

3. Injection

Injection is one of the oldest vulnerability that can lead to data loss, data theft, service denial, etc and in worst scenario can compromise the full system. Injection attacks, especially SQL Injections (SQLi attacks) and Cross-site Scripting (XSS), are most dangerous and widespread weakness of any application. Other than these, there are several other types of Injections that a web developer should look out for. Using a safe API and positive server-side input validation can help in preventing Injections.

4. Insecure Design

To keep application free of security gaps, it is recommended that developers use safe design patterns and securely created threat modeling while designing. A secure application can be build using secured component library, tooling and methodology. Implementation of ineffective control design can lead to different weaknesses termed as Insecure Design. It is suggested to determine the level of security design before beginning the app development to prevent Insecure Design vulnerability.

5. Security Misconfiguration

Inaccurately or insecurely configured security controls can cause Security Misconfiguration vulnerability and put the system and data to risk. Unnecessary features enabled or installed, outdated software, etc can also cause Security Misconfiguration. This threat can impact any layer of the application stack, cloud or network, leaving important information to expose. It can be prevented by implementing secure installation process. Using an automated process to verify the effectiveness of the configurations and settings in all environments is also recommended.

6. Vulnerable and Outdated Components

If the components used in the development of a website or application is outdated or is vulnerable itself, it can compromise the whole application. This is known as Vulnerable and Outdated Components vulnerability. A developer should also always know the versions of components being used and should perform regular scan for vulnerabilities to keep problems at bay. As a protective measure, remove unnecessary features, unused dependencies, components, files and documentation from time to time.

7. Identification and Authentication Failures

Before accessing any protected site, the application must keep a check on user’s identity, authentication, and session management. These things are important for protection against authentication-related attacks or can else lead to Identification and Authentication Failures vulnerability. With the introduction of two-factor authentication, the number of failures has reduced but is still too frequent to be listed in the OWASP Top 10 vulnerabilities 2023. Limiting failed login attempts and generating a new random session ID at every login can further prevent the issue.

8. Software and Data Integrity Failures

Code and infrastructure that does not protect against integrity violations can lead to Software and data integrity failures. It is therefore important to verify the installed packages on your system and make sure that the data is from a reliable source and has not been altered at any stage. Implementing libraries and dependencies, software supply chain security tool, and review process for code and configuration changes are other ways of preventing this vulnerability.

9. Security Logging and Monitoring

Security logging and monitoring are vital to the maintenance of a secure infrastructure. Viewing the logs regularly can be helpful in acting fast in case any potentially dangerous activity is noticed. On the other hand, insufficient monitoring of log activities can lead to a bunch of issues collectively termed as Security logging and monitoring vulnerability. Depending on the risk of the application, protective measures must be applied to eliminate any risk as soon as possible.

10. Server-Side Request Forgery

Server-Side Request Forgery (SSRF) occurs when a web application procures a distant resource without validating the URL supplied by the user. The attacker can send a crafted request to an unexpected destination, even if protected by a firewall or VPN. Both frequency and severity of this vulnerability has increased with time. To protect an application against SSRF, all the data entered should be checked carefully and each URL scheme should be checked against the allowed list.

Previous[KISA] 내PC돌보미 - PC 보안 가이드 [취약점 관리(Mac)]NextOWASP Top 10 API security risks 2023

출처 :

OWASP
[NHN Cloud] 2022년 NHN Cloud 교육 정보 공유NHN Cloud
NHN Cloud 정보 사이트
Security Update ListSecurity Update List
보안 업데이트 정보 사이트
Logo
Logo