Logo
OWASP

Introduction to OWASP and Its Impact on Security

What is OWASP

Explore the World of Cyber Security

The project aims to address the growing problem of organizations deploying potentially sensitive APIs as part of their software delivery. These APIs are used to perform internal tasks or interface with third parties, but unfortunately many APIs do not undergo rigorous security testing to protect them from attacks.

OWASP
Free Security Tools

OWASP Resources and Community

The Open Worldwide Application Security Project (OWASP) is an open community dedicated to helping organizations develop, buy, and maintain trustworthy applications and APIs.

  • check-iconApplication security tools and standards.
  • check-iconA complete book on application security testing, secure code development, and secure code reviews.
  • check-iconPresentations and videos.
  • check-iconCheat sheets on many common topics.
  • check-iconStandard security controls and libraries.
  • check-iconLocal chapters around the world.
  • check-iconCutting-edge research.
  • check-iconA wide range of conferences around the world.
  • check-iconMailing List (Archive).
OWASP Stands
What is the OWASP Top 10?

Your Guide to Web Application Security

OWASP (Open Web Application Security Project) is a non-profit foundation focused on improving software security globally. With over 275 chapters worldwide, including OWASP Japan, it drives research, creates guidelines, and develops tools for diagnosing vulnerabilities. The OWASP Top 10 highlights the most critical web security threats, issued every 2–3 years. The latest version, OWASP Top 10 2023, provides a detailed overview of risks and trends.

How the OWASP Top 10 is Rated

  • check iconLikelihood of Exploitability
  • check iconTechnical Impact
  • check iconDetectability

* The OWASP Top 10 evaluates vulnerabilities using a structured risk rating methodology to prioritize the most critical threats.

Learn More About OWASP →
OWASP

1

API1:2023 Broken Object Level Authorization

Broken object-level authorization leads to sensitive data exposure due to improper access control.

2

API2:2023 Broken Authentication

API2:2023 Broken authentication could lead to unauthorized access to user accounts.

3

API3:2023 Broken Object Property Level Authorization

API3:2023 Broken object property level authorization could lead to unauthorized manipulation of data.

4

API4:2023 Unrestricted Resource Consumption

API4:2023 Unlimited resource consumption will result in service outages or performance degradation.

5

API5:2023 Broken Function Level Authorization

API5:2023 Function level authorization corruption allows unauthorized function execution

6

API6:2023 Unrestricted Access to Sensitive Business Flows

API6:2023 Unrestricted access to sensitive business flows puts critical business processes at risk.

7

API7:2023 Server Side Request Forgery

API7:2023 Server-side request forgery creates a security vulnerability.

8

API8:2023 Security Misconfiguration

API8:2023 Security misconfigurations expose system vulnerabilities.

9

API9:2023 Improper Inventory Management

API9:2023 Improper inventory management leads to misuse of resources and unauthorized leakage of data.

10

API10:2023 Unsafe Consumption of APIs

API10:2023 Insecure use of the API can allow unauthorized access to the system.

OWASPOWASP
Summary

Empowering the Security Community Through Open Collaboration

All OWASP tools, documents, videos, presentations, and chapters are free and open to anyone with an interest in improving application security.

We advocate approaching application security as a people, process, and technology challenge because the most effective approach to application security requires improvements in these areas.

OWASP is a new kind of organization: free from commercial pressures, and therefore able to provide unbiased, practical, and cost-effective information about application security.

OWASP is not affiliated with any technology company but advocates for the wise use of commercial security technology. OWASP produces many types of materials in a collaborative, transparent, and open manner.

The OWASP Foundation is a nonprofit organization that ensures the long-term success of the project. Most people involved in OWASP, including the OWASP Board, chapter leaders, project leaders, and members, are volunteers. We support innovative security research through grants and infrastructure support.