Statements (18)
Predicate | Object |
---|---|
gptkbp:instanceOf |
OWASP Top 10 Category
|
gptkbp:describes |
risks related to design flaws in software
|
gptkbp:example |
business logic vulnerabilities
lack of secure design patterns missing or ineffective control design |
gptkbp:focusesOn |
security weaknesses in design and architecture
|
https://www.w3.org/2000/01/rdf-schema#label |
A04:2021 – Insecure Design
|
gptkbp:introducedIn |
2021
|
gptkbp:mitigatedBy |
threat modeling
adopt secure design patterns secure development lifecycle |
gptkbp:partOf |
OWASP Top 10:2021
|
gptkbp:publishedBy |
gptkb:OWASP
|
gptkbp:rankInOWASP2021 |
4
|
gptkbp:relatedTo |
gptkb:A01:2021_–_Broken_Access_Control
gptkb:A05:2021_–_Security_Misconfiguration |
gptkbp:bfsParent |
gptkb:OWASP_Top_10
|
gptkbp:bfsLayer |
6
|