Verify that all components are up to date, preferably using a dependency checker during build or compile time. (C2)
Level 1 required: True
Level 2 required: True
Level 3 required: True
CWE: 1026
Verify that all unneeded features, documentation, sample applications and configurations are removed.
Level 1 required: True
Level 2 required: True
Level 3 required: True
CWE: 1002
Verify that if application assets, such as JavaScript libraries, CSS or web fonts, are hosted externally on a Content Delivery Network (CDN) or external provider, Subresource Integrity (SRI) is used to validate the integrity of the asset.
Level 1 required: True
Level 2 required: True
Level 3 required: True
CWE: 829
Verify that third party components come from pre-defined, trusted and continually maintained repositories. (C2)
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 829
Verify that a Software Bill of Materials (SBOM) is maintained of all third party libraries in use. (C2)
Level 1 required: False
Level 2 required: True
Level 3 required: True
Verify that the attack surface is reduced by sandboxing or encapsulating third party libraries to expose only the required behaviour into the application. (C2)
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 265
Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.
Loading comments 0%