Fortinet white logo
Fortinet white logo

Administration Guide

OWASP Top 10 Compliance

OWASP Top 10 Compliance

Through the FortiView > OWASP Top 10 Compliance page, you can view your compliance rate against the OWASP Application Security Top 10 by assessing the security configuration of each application and categorizing them into the top 10 categories. Based on the assessment results, you can refine configurations to enhance the security posture of your virtual server.

The OWASP Top 10 Compliance dashboard currently only supports HTTP, HTTPS, HTTP2, and Explicit-HTTP virtual servers; no other virtual server types will be included in the OWASP Top 10 Compliance rating.

To view the OWASP Top 10 Compliance dashboard, you need to first enable the OWASP Top10 Compliance option from system settings. Go to System > Settings, and enable OWASP Top10 Compliance in the Basic settings.

The OWASP Top 10 represents the most critical security risks to web applications as identified by OWASP (Open Web Application Security Project), an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Organizations strive to comply with the OWASP Top 10 to ensure that the most critical security vulnerabilities in their web applications are addressed, allowing them to develop stronger defenses against cyber threats and reduce the risk of data breaches.

FortiADC's OWASP Top 10 Compliance dashboard empowers users to achieve full compliance by providing critical insights and evaluating the protection level of each server policy. The Compliance Rate of each virtual server is determined by analyzing their current security-related configurations—including WAF modules, Antivirus, FortiView, and Traffic log statuses—and assessing their level of protection against each OWASP Top 10 threat. This comprehensive analysis allows you to assess the effectiveness of your server policies and make the necessary adjustments to address OWASP Top 10 security risks effectively. To learn more about how the Compliance Rate is calculated, see Interpreting the Compliance Rate.

From the FortiView > OWASP Top 10 Compliance page, you can view the Compliance Rate of your virtual servers:

To view the Compliance Details, you can either select the Virtual Server and click Details or you can double-click the Virtual Server.

Interpreting the Compliance Rate

The Compliance Rate evaluates how well your virtual server policy aligns with the best practices recommended by OWASP for mitigating the Top 10 vulnerabilities. It assesses the configuration and rules in place to protect against these risks.

The Compliance Rate is calculated based on the percentage of compliance that has been reached for each OWASP Top 10 threat. For example, if the Compliance Rate is 1/10, then your virtual server configurations satisfies the protection requirements against 1 out of 10 OWASP Top 10 threats.

For each OWASP Top 10 threat, to reach 100% protection compliance, required protections must be fulfilled by completing specific security settings that target against the particular Top 10 vulnerability. The Compliance Rate is then calculated by aggregating the compliance percentage for all 10 threats.

In the example below, virtual server vs-http-119 has a Compliance Rate of 1/10, with only the A09:2021-Security Logging and Monitoring Failures vulnerability having fulfilled 100% of the protection requirements by enabling FortiView and Traffic Log.

The following lists the protection requirements for each OWASP Top 10 threat.

OWASP Top 10

Category

Configuration Setting

A01:2021-Broken Access Control

Access control enforces policy to ensure that users cannot act outside of their intended permissions. Failures in access control typically lead to unauthorized information disclosure, modification or destruction of data, or performing business functions beyond the user's limits.

Attack Signature

Information Disclosure

Trojans

Bad Robot

Required Protection

Http Protocol Constraint
URL Protection
Bot Detection
Advanced Protection
Input Validation

Open API Validation

HTTP Head Security

Threshold Base Detection

Biometrics Base Detection

Fingerprint Base Detection

API Security

A02:2021-Cryptographic Failures

This issue involves a failure to protect sensitive data that should not be publicly accessible. Organizations should understand and comply with their local privacy laws as well as any regional regulations where they conduct business.

Attack Signature

Known Exploits

Credit Card Detection

Information Disclosure

Required Protection

Cookie Security

Data Loss Prevention

A03:2021-Injection

An injection occurs when an attacker sends invalid data to a web application with the intention of making it perform actions it is not designed or programmed to do. Common types of injections include SQL, NoSQL, OS command, ORM, LDAP, and EL or OGNL injections.

Attack Signature

Generic Attacks

Cross Site Scripting

Cross Site Scripting(Extended)

SQL Injection

SQL Injection(Extended)

Required Protection

SQL Injection Detection

XSS Injection Detection

XML Validation

JSON Validation

A04:2021-Insecure Design

Insecure design is a broad category representing various weaknesses, characterized by "missing or ineffective control design". An insecure design cannot be fixed by a perfect implementation because, by definition, the necessary security controls were never created to defend against specific attacks.

Attack Signature

Bad Robot

Credit Card Detection

Cross Site Scripting

Generic Attacks

Information Disclosure

Known Exploits

SQL Injection

Trojans

Required Protection

JSON Validation

XML Validation

Open API Validation

API Gateway

API Security

Bot Detection

Threshold Base Detection

Biometrics Base Detection

Fingerprint Base Detection

Antivirus

A05:2021-Security Misconfiguration

Security misconfigurations are design or configuration weaknesses resulting from configuration errors or shortcomings. Without a consistent and repeatable application security configuration process, systems are at a higher risk.

Attack Signature

Generic Attacks

Required Protection

XML Validation

JSON Validation

CORS Protection

A06:2021-Vulnerable and Outdated Components

Components with known vulnerabilities, such as CVEs, should be identified and patched, while outdated or malicious components should be evaluated for viability and the risks they may introduce. Attackers actively seek out websites using vulnerable components and aggressively exploit them.

Attack Signature

Generic Attacks

Generic Attacks(Extended)

Known Exploits

A07:2021-Identification and Authentication Failures

Confirmation of the user's identity, authentication, and session management is critical to protect against authentication-related attacks. A broken authentication vulnerability can allow an attacker to use manual and/or automatic methods to try to gain control over any account they want in a system.

Attack Signature

Generic Attacks

Required Protection

CSRF Protection

Brute Force Attack Detection

Credential Stuffing Defense

API Gateway

A08:2021-Software and Data Integrity Failures

Software and data integrity failures occur when code and infrastructure do not protect against integrity violations. These failures can take many forms, especially as the web evolves and the use of third-party code and services in web applications becomes increasingly common.

Attack Signature

Generic Attacks

A09:2021-Security Logging and Monitoring Failures

Logging and monitoring should be performed frequently on a website. Failure to do so leaves the site vulnerable to more severe compromise.

Required Protection

FortiView

Traffic Log

A10:2021-Server-Side Request Forgery

Server-side request forgery (SSRF) occurs when a web application fetches a remote resource without validating the user-supplied URL. With modern web applications allowing end-users to fetch URLs, SSRF incidents are increasingly common.

Attack Signature

Generic Attacks

OWASP Top 10 Compliance

OWASP Top 10 Compliance

Through the FortiView > OWASP Top 10 Compliance page, you can view your compliance rate against the OWASP Application Security Top 10 by assessing the security configuration of each application and categorizing them into the top 10 categories. Based on the assessment results, you can refine configurations to enhance the security posture of your virtual server.

The OWASP Top 10 Compliance dashboard currently only supports HTTP, HTTPS, HTTP2, and Explicit-HTTP virtual servers; no other virtual server types will be included in the OWASP Top 10 Compliance rating.

To view the OWASP Top 10 Compliance dashboard, you need to first enable the OWASP Top10 Compliance option from system settings. Go to System > Settings, and enable OWASP Top10 Compliance in the Basic settings.

The OWASP Top 10 represents the most critical security risks to web applications as identified by OWASP (Open Web Application Security Project), an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Organizations strive to comply with the OWASP Top 10 to ensure that the most critical security vulnerabilities in their web applications are addressed, allowing them to develop stronger defenses against cyber threats and reduce the risk of data breaches.

FortiADC's OWASP Top 10 Compliance dashboard empowers users to achieve full compliance by providing critical insights and evaluating the protection level of each server policy. The Compliance Rate of each virtual server is determined by analyzing their current security-related configurations—including WAF modules, Antivirus, FortiView, and Traffic log statuses—and assessing their level of protection against each OWASP Top 10 threat. This comprehensive analysis allows you to assess the effectiveness of your server policies and make the necessary adjustments to address OWASP Top 10 security risks effectively. To learn more about how the Compliance Rate is calculated, see Interpreting the Compliance Rate.

From the FortiView > OWASP Top 10 Compliance page, you can view the Compliance Rate of your virtual servers:

To view the Compliance Details, you can either select the Virtual Server and click Details or you can double-click the Virtual Server.

Interpreting the Compliance Rate

The Compliance Rate evaluates how well your virtual server policy aligns with the best practices recommended by OWASP for mitigating the Top 10 vulnerabilities. It assesses the configuration and rules in place to protect against these risks.

The Compliance Rate is calculated based on the percentage of compliance that has been reached for each OWASP Top 10 threat. For example, if the Compliance Rate is 1/10, then your virtual server configurations satisfies the protection requirements against 1 out of 10 OWASP Top 10 threats.

For each OWASP Top 10 threat, to reach 100% protection compliance, required protections must be fulfilled by completing specific security settings that target against the particular Top 10 vulnerability. The Compliance Rate is then calculated by aggregating the compliance percentage for all 10 threats.

In the example below, virtual server vs-http-119 has a Compliance Rate of 1/10, with only the A09:2021-Security Logging and Monitoring Failures vulnerability having fulfilled 100% of the protection requirements by enabling FortiView and Traffic Log.

The following lists the protection requirements for each OWASP Top 10 threat.

OWASP Top 10

Category

Configuration Setting

A01:2021-Broken Access Control

Access control enforces policy to ensure that users cannot act outside of their intended permissions. Failures in access control typically lead to unauthorized information disclosure, modification or destruction of data, or performing business functions beyond the user's limits.

Attack Signature

Information Disclosure

Trojans

Bad Robot

Required Protection

Http Protocol Constraint
URL Protection
Bot Detection
Advanced Protection
Input Validation

Open API Validation

HTTP Head Security

Threshold Base Detection

Biometrics Base Detection

Fingerprint Base Detection

API Security

A02:2021-Cryptographic Failures

This issue involves a failure to protect sensitive data that should not be publicly accessible. Organizations should understand and comply with their local privacy laws as well as any regional regulations where they conduct business.

Attack Signature

Known Exploits

Credit Card Detection

Information Disclosure

Required Protection

Cookie Security

Data Loss Prevention

A03:2021-Injection

An injection occurs when an attacker sends invalid data to a web application with the intention of making it perform actions it is not designed or programmed to do. Common types of injections include SQL, NoSQL, OS command, ORM, LDAP, and EL or OGNL injections.

Attack Signature

Generic Attacks

Cross Site Scripting

Cross Site Scripting(Extended)

SQL Injection

SQL Injection(Extended)

Required Protection

SQL Injection Detection

XSS Injection Detection

XML Validation

JSON Validation

A04:2021-Insecure Design

Insecure design is a broad category representing various weaknesses, characterized by "missing or ineffective control design". An insecure design cannot be fixed by a perfect implementation because, by definition, the necessary security controls were never created to defend against specific attacks.

Attack Signature

Bad Robot

Credit Card Detection

Cross Site Scripting

Generic Attacks

Information Disclosure

Known Exploits

SQL Injection

Trojans

Required Protection

JSON Validation

XML Validation

Open API Validation

API Gateway

API Security

Bot Detection

Threshold Base Detection

Biometrics Base Detection

Fingerprint Base Detection

Antivirus

A05:2021-Security Misconfiguration

Security misconfigurations are design or configuration weaknesses resulting from configuration errors or shortcomings. Without a consistent and repeatable application security configuration process, systems are at a higher risk.

Attack Signature

Generic Attacks

Required Protection

XML Validation

JSON Validation

CORS Protection

A06:2021-Vulnerable and Outdated Components

Components with known vulnerabilities, such as CVEs, should be identified and patched, while outdated or malicious components should be evaluated for viability and the risks they may introduce. Attackers actively seek out websites using vulnerable components and aggressively exploit them.

Attack Signature

Generic Attacks

Generic Attacks(Extended)

Known Exploits

A07:2021-Identification and Authentication Failures

Confirmation of the user's identity, authentication, and session management is critical to protect against authentication-related attacks. A broken authentication vulnerability can allow an attacker to use manual and/or automatic methods to try to gain control over any account they want in a system.

Attack Signature

Generic Attacks

Required Protection

CSRF Protection

Brute Force Attack Detection

Credential Stuffing Defense

API Gateway

A08:2021-Software and Data Integrity Failures

Software and data integrity failures occur when code and infrastructure do not protect against integrity violations. These failures can take many forms, especially as the web evolves and the use of third-party code and services in web applications becomes increasingly common.

Attack Signature

Generic Attacks

A09:2021-Security Logging and Monitoring Failures

Logging and monitoring should be performed frequently on a website. Failure to do so leaves the site vulnerable to more severe compromise.

Required Protection

FortiView

Traffic Log

A10:2021-Server-Side Request Forgery

Server-side request forgery (SSRF) occurs when a web application fetches a remote resource without validating the user-supplied URL. With modern web applications allowing end-users to fetch URLs, SSRF incidents are increasingly common.

Attack Signature

Generic Attacks