Different approaches will find different subsets of the security vulnerabilities lurking in an application and are most effective at different times in the software lifecycle. They each represent different tradeoffs of time, effort, cost and vulnerabilities found.
The Open Worldwide Application Security Project (OWASP) provides free and open resources. It is led by a non-profit called The OWASP Foundation. The OWASP Top 10 - 2017 results from recent research based on comprehensive data compiled from over 40 partner organizations. This data revealed approximately 2.3 million vulnerabilities across over 50,000 applications.4 According to the OWASP Top 10 - 2021, the ten most critical web application security risks include:5
The OWASP Top 10 Proactive Controls 2024 is a list of security techniques every software architect and developer should know and heed.
The current list contains:
Security testing techniques scour for vulnerabilities or security holes in applications. These vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire software development life cycle (SDLC) so that vulnerabilities may be addressed in a timely and thorough manner.
There are many kinds of automated tools for identifying vulnerabilities in applications. Common tool categories used for identifying application vulnerabilities include:
Happe, Andreas (3 June 2021). "What is AppSec anyways?". snikt.net. https://snikt.net/blog/2021/06/03/what-is-appsec-anyways/ ↩
"Web Application Security Overview". 2015-10-23. https://msdn.microsoft.com/en-us/library/ff648636.aspx ↩
Shuaibu, Bala Musa; Norwawi, Norita Md; Selamat, Mohd Hasan; Al-Alwani, Abdulkareem (2013-01-17). "Systematic review of web application security development model". Artificial Intelligence Review. 43 (2): 259–276. doi:10.1007/s10462-012-9375-6. ISSN 0269-2821. S2CID 15221613. /wiki/Doi_(identifier) ↩
Korolov, Maria (Apr 27, 2017). "Latest OWASP Top 10 looks at APIs, web apps: The new OWASP Top 10 list is out, and while most of it remains the same, there are new additions focusing on web applications and APIs". CSO. ProQuest 1892694046. /wiki/ProQuest ↩
"OWASP Top 10 - 2021: The Ten Most Critical Web Application Security Risks". Open Web Application Security Project. 2021. Retrieved January 11, 2022. https://owasp.org/Top10/ ↩
"Web Application Vulnerability Scanners". NIST. http://samate.nist.gov/index.php/Web_Application_Vulnerability_Scanners.html ↩
"Fuzzing". OWASP. https://owasp.org/www-community/Fuzzing ↩
Williams, Jeff (2 July 2015). "I Understand SAST and DAST But What is an IAST and Why Does it Matter?". Contrast Security. Retrieved 10 April 2018. https://www.contrastsecurity.com/security-influencers/question-i-understand-sast-and-dast-and-how-to-use-them-but-what-is-iast-and-why-does-it-matter ↩
Velasco, Roberto (7 May 2020). "What is IAST? All About Interactive Application Security Testing". Hdiv Security. Retrieved 7 May 2020. https://hdivsecurity.com/bornsecure/what-is-iast-interactive-application-security-testing/ ↩
Abezgauz, Irene (February 17, 2014). "Introduction to Interactive Application Security Testing". Quotium. Archived from the original on April 3, 2018. Retrieved January 25, 2018. https://web.archive.org/web/20180403193750/http://www.quotium.com/resources/interactive-application-security-testing/ ↩
Rohr, Matthias (November 26, 2015). "IAST: A New Approach For Agile Security Testing". Secodis. https://blog.secodis.com/2015/11/26/the-emerge-of-iast/ ↩
"OWASP Application Security Verification Standard". https://owasp.org/www-project-application-security-verification-standard/ ↩