Statements (18)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:OWASP_Top_10_Category
|
| gptkbp:describes |
risks related to design flaws in software
|
| gptkbp:example |
business logic vulnerabilities
lack of secure design patterns missing or ineffective control design |
| gptkbp:focusesOn |
security weaknesses in design and architecture
|
| gptkbp:introducedIn |
2021
|
| gptkbp:mitigatedBy |
threat modeling
adopt secure design patterns secure development lifecycle |
| gptkbp:partOf |
OWASP Top 10:2021
|
| gptkbp:publishedBy |
gptkb:OWASP
|
| gptkbp:rankInOWASP2021 |
4
|
| gptkbp:relatedTo |
gptkb:A01:2021_–_Broken_Access_Control
gptkb:A05:2021_–_Security_Misconfiguration |
| gptkbp:bfsParent |
gptkb:OWASP_Top_10
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
A04:2021 – Insecure Design
|