Back to Learning Space
Security12 min read

OWASP Top 10 — Key Takeaways

A concise study guide to the OWASP Top 10 (2021): what OWASP is, the methodology behind the list, key terminology (CWE, CVE, CVSS, ASVS), and a deep dive into the #1 risk — Broken Access Control.

What is OWASP?

OWASP stands for Open Web Application Security Project — a free, open, non-profit global community founded in 2001 (non-profit since 2004), dedicated to making web applications safer worldwide.

Core ValueWhat it Means
OpenEverything is transparent — code, finances, documents
InnovationEncourages experimentation, hackathons, CTFs
GlobalInclusive of everyone, everywhere
IntegrityVendor-neutral — no product bias

Anyone can join — beginners welcome. Members are volunteers from all walks of the tech world.

What is the OWASP Top 10?

An awareness document listing the most critical web application security risks, published roughly every 3–4 years.

  • Latest edition: 2021
  • Based on data from 500,000+ applications — the largest dataset OWASP has ever used
  • 8 of 10 categories derived from hard data
  • 2 of 10 derived from security practitioner surveys
  • Focus shifted to root causes (e.g. bad cryptography) over symptoms (e.g. exposed credit card data)

Key Terminology

TermSimple Definition
CWEGeneral category of a software weakness (e.g. "path traversal")
CVEA specific, named vulnerability in a real product (e.g. Log4j)
CVSSA scoring system (1–10) for how exploitable or impactful a vulnerability is
ASVSOWASP's Application Security Verification Standard — an actionable checklist you run against your app

The 2021 OWASP Top 10 at a Glance

#RiskOne-liner
1Broken Access ControlUsers can access things they shouldn't
2Cryptographic FailuresWeak or missing encryption exposes data
3InjectionAttackers execute unauthorized commands (was #1 in 2017)
4Insecure DesignPoor architecture makes security impossible
5Security MisconfigurationDefault settings, wrong configs left exposed
6Vulnerable & Outdated ComponentsUnpatched third-party libraries
7Identification & Auth FailuresWeak login/session mechanisms
8Software & Data Integrity FailuresUntrusted updates, CI/CD pipeline risks
9Security Logging & Monitoring FailuresNo logs = no visibility into attacks
10Server-Side Request Forgery (SSRF)Server tricked into making unintended requests

Deep Dive: Broken Access Control (#1)

Why it's #1 — The Numbers

MetricValue
CWEs mapped34
Apps affected (max)55.97%
Max coverage94.55% — nearly every app tested had this issue
Exploit score6.92 / 10
Impact score5.93 / 10
Total vulnerable apps318,487 out of 500,000+
Unique exploit paths (CVEs)19,013

Authentication vs Authorization

Don't confuse them — both must be enforced.

Authentication  →  WHO are you? (Proving your identity)
Authorization   →  WHAT can you do? (Your permissions)

Types of Access Control

TypeHow it Works
RBAC (Role-Based)Access based on your role: user / admin / superuser
DAC (Discretionary)Access based on user identity or group membership
MAC (Mandatory)Access based on sensitivity labels assigned to data
Permission-BasedAccess based on specific action strings: read / write / delete

Common Attack Scenarios

  • Changing URL params: ?account=john → ?account=admin
  • Force-browsing to /admin without being an admin
  • Privilege escalation — acting as a higher-level user
  • JWT token tampering or replay after logout
  • CORS misconfiguration exposing APIs to unintended origins
  • Using unauthorized HTTP methods (e.g. DELETE) on API endpoints

How to Protect Your App

PrincipleAction
Deny by defaultBlock everything unless explicitly granted
Enforce server-sideNever trust client-side access checks
Implement once, reuseStandardize access control logic across the app
Enforce record ownershipUsers should only CRUD their own data
Disable directory listingsDon't expose your app's file structure
Invalidate JWT on logoutPrevent token replay attacks
Rate-limit APIsMinimize damage if a breach occurs
Log all failuresTrack and alert on unauthorized access attempts
Test like an attackerInclude security-focused QA, not just happy-path

Final Takeaways

1. OWASP Top 10 ≠ Your Top 10 — Use it as a baseline awareness document. Your specific app may have different priority risks.

2. Build security in from the start — Retrofitting access control is harder and costlier than doing it right during design.

3. Use ASVS alongside the Top 10 — The Top 10 tells you what the problems are. ASVS tells you how to build against them.

4. Access control is only effective if enforced server-side — Client-side checks can always be bypassed. The server is the source of truth.

5. Keep watching for updates — The Top 10 refreshes every 3–4 years. Next edition expected around 2024–2025.

Based on the OWASP Top 10 (2021) — InfoSec Skills Learning Path by John Wagnon (F5 Networks)