Software and Data Integrity Failures
GPTKB entity
Statements (24)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:OWASP_Top_10_Category
|
| gptkbp:category |
A08
|
| gptkbp:example |
insecure deserialization
CI/CD pipeline flaws dependency confusion insecure libraries insecure plugins insecure software updates |
| gptkbp:focusesOn |
integrity of software and data
|
| gptkbp:includes |
code and infrastructure that does not protect against integrity violations
|
| gptkbp:mitigatedBy |
implement integrity checks
secure CI/CD pipelines use digital signatures to verify software and data use trusted repositories |
| gptkbp:partOf |
OWASP Top 10 2021
|
| gptkbp:replacedBy |
gptkb:Insecure_Deserialization
|
| gptkbp:riskFactor |
supply chain attacks
remote code execution data tampering attackers can modify software or data |
| gptkbp:bfsParent |
gptkb:OWASP_Top_10_vulnerabilities
gptkb:OWASP_Top_Ten |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Software and Data Integrity Failures
|