Jan 28 2026

OWASP Top 10 Web Application Security Risks ↔ MITRE ATT&CK Mapping

Category: Attack Matrix,owaspdisc7 @ 9:42 am

Below is a clear, practitioner-oriented breakdown of the OWASP Top 10 Web Application Security Risks (latest major revision: OWASP Top 10 – 2021, which is still the current standard as of 2025).

I’ll cover what each risk is, why it matters, common attack examples, and practical mitigations—useful for both defensive (Blue Team) and offensive (Red Team / pentesting) perspectives.


1. A01: Broken Access Control

What it is:
Failures that allow users to act outside their intended permissions.

Why it matters:
Access control flaws are the most common and most damaging web app vulnerabilities.

Common examples:

  • IDOR (Insecure Direct Object Reference): /api/users/1234
  • Horizontal privilege escalation
  • Vertical privilege escalation (user → admin)
  • Missing authorization checks on API endpoints

Attack scenario:

GET /api/invoices/9876

Attacker changes 9876 to another user’s invoice ID.

Mitigations:

  • Enforce server-side authorization on every request
  • Use deny-by-default policies
  • Implement role-based access control (RBAC)
  • Log and alert on access control failures

2. A02: Cryptographic Failures

(formerly Sensitive Data Exposure)

What it is:
Improper protection of sensitive data in transit or at rest.

Why it matters:
Leads directly to data breaches, credential theft, and compliance violations.

Common examples:

  • Plaintext passwords
  • Weak hashing (MD5, SHA1)
  • No HTTPS or weak TLS
  • Hardcoded secrets

Attack scenario:

  • Attacker intercepts traffic over HTTP
  • Dumps password hashes and cracks them offline

Mitigations:

  • Use TLS 1.2+ everywhere
  • Hash passwords with bcrypt / Argon2
  • Encrypt sensitive data at rest
  • Proper key management (HSM, KMS)

3. A03: Injection

What it is:
Untrusted data is interpreted as code by an interpreter.

Why it matters:
Injection often leads to full database compromise or RCE.

Common types:

  • SQL Injection
  • NoSQL Injection
  • Command Injection
  • LDAP Injection

Attack scenario (SQLi):

' OR 1=1--

Mitigations:

  • Use parameterized queries
  • Avoid dynamic query construction
  • Input validation (allow-lists)
  • ORM frameworks (used correctly)

4. A04: Insecure Design

What it is:
Architectural or design flaws that cannot be fixed with simple code changes.

Why it matters:
Secure coding cannot fix insecure architecture.

Common examples:

  • No rate limiting
  • No threat modeling
  • Trusting client-side validation
  • Missing business logic controls

Attack scenario:

  • Unlimited password attempts → credential stuffing

Mitigations:

  • Perform threat modeling
  • Use secure design patterns
  • Abuse-case testing
  • Define security requirements early

5. A05: Security Misconfiguration

What it is:
Improperly configured frameworks, servers, or platforms.

Why it matters:
Misconfigurations are easy to exploit and extremely common.

Common examples:

  • Default credentials
  • Stack traces exposed
  • Open admin panels
  • Directory listing enabled

Attack scenario:

  • Attacker finds /admin or /phpinfo.php

Mitigations:

  • Harden systems (CIS benchmarks)
  • Disable unused features
  • Automated configuration audits
  • Secure deployment pipelines

6. A06: Vulnerable and Outdated Components

What it is:
Using libraries or components with known vulnerabilities.

Why it matters:
Many breaches occur via third-party dependencies.

Common examples:

  • Log4Shell (Log4j)
  • Old jQuery with XSS
  • Outdated CMS plugins

Attack scenario:

  • Exploit known CVE with public PoC

Mitigations:

  • Maintain an SBOM
  • Regular dependency updates
  • Use tools like:
    • OWASP Dependency-Check
    • Snyk
    • Dependabot

7. A07: Identification and Authentication Failures

What it is:
Weak authentication or session management.

Why it matters:
Allows account takeover and impersonation.

Common examples:

  • Weak passwords
  • No MFA
  • Session fixation
  • JWT misconfiguration

Attack scenario:

  • Brute-force login without rate limiting

Mitigations:

  • Enforce strong password policies
  • Implement MFA
  • Secure session cookies (HttpOnly, Secure)
  • Proper JWT validation

8. A08: Software and Data Integrity Failures

What it is:
Failure to protect integrity of code and data.

Why it matters:
Leads to supply chain attacks.

Common examples:

  • Unsigned updates
  • Insecure CI/CD pipelines
  • Deserialization flaws

Attack scenario:

  • Malicious dependency injected during build

Mitigations:

  • Code signing
  • Secure CI/CD pipelines
  • Validate serialized data
  • Use trusted repositories only

9. A09: Security Logging and Monitoring Failures

What it is:
Insufficient logging and alerting.

Why it matters:
Attacks go undetected or are discovered too late.

Common examples:

  • No login failure logs
  • No alerting on privilege escalation
  • Logs not protected

Attack scenario:

  • Attacker maintains persistence for months unnoticed

Mitigations:

  • Centralized logging (SIEM)
  • Log authentication and authorization events
  • Real-time alerting
  • Incident response plans

10. A10: Server-Side Request Forgery (SSRF)

What it is:
Server makes unauthorized requests on behalf of attacker.

Why it matters:
Can lead to cloud metadata compromise and internal network access.

Common examples:

  • Fetching URLs without validation
  • Accessing 169.254.169.254 (cloud metadata)

Attack scenario:

POST /fetch?url=http://localhost/admin

Mitigations:

  • URL allow-listing
  • Block internal IP ranges
  • Disable unnecessary outbound requests
  • Network segmentation

OWASP Top 10 Summary Table

RankCategory
A01Broken Access Control
A02Cryptographic Failures
A03Injection
A04Insecure Design
A05Security Misconfiguration
A06Vulnerable & Outdated Components
A07Identification & Authentication Failures
A08Software & Data Integrity Failures
A09Logging & Monitoring Failures
A10SSRF

How This Is Used in Practice

  • Developers: Secure coding & design baseline
  • Pentesters: Test case foundation
  • Blue Teams: Control prioritization
  • Compliance: Mapping to ISO 27001, PCI-DSS, SOC 2

Below is a practical alignment of OWASP Top 10 (2021) with MITRE ATT&CK (Enterprise).
This mapping is widely used in threat modeling, purple-team exercises, and SOC detection engineering to bridge application-layer risk with adversary behavior.

⚠️ Important:
OWASP describes what is vulnerable; MITRE ATT&CK describes how adversaries operate.
The mapping is therefore many-to-many, not 1:1.


OWASP Top 10 ↔ MITRE ATT&CK Mapping


A01 – Broken Access Control

Core Risk: Unauthorized actions and privilege escalation

MITRE ATT&CK Techniques

  • T1068 – Exploitation for Privilege Escalation
  • T1078 – Valid Accounts
  • T1098 – Account Manipulation
  • T1548 – Abuse Elevation Control Mechanism

Real-World Flow

  1. Attacker exploits IDOR
  2. Accesses admin-only endpoints
  3. Performs privilege escalation

Detection Focus

  • Unusual object access patterns
  • Privilege changes without admin action
  • Cross-account data access

A02 – Cryptographic Failures

Core Risk: Exposure of credentials or sensitive data

MITRE ATT&CK Techniques

  • T1555 – Credentials from Password Stores
  • T1003 – OS Credential Dumping
  • T1040 – Network Sniffing
  • T1110 – Brute Force

Real-World Flow

  1. Intercept plaintext credentials
  2. Crack weak hashes
  3. Reuse credentials for lateral access

Detection Focus

  • TLS downgrade attempts
  • Excessive authentication failures
  • Credential reuse anomalies

A03 – Injection

Core Risk: Interpreter abuse leading to DB or OS compromise

MITRE ATT&CK Techniques

  • T1190 – Exploit Public-Facing Application
  • T1059 – Command and Scripting Interpreter
  • T1505 – Server Software Component Abuse

Real-World Flow

  1. SQLi in login form
  2. Dump credentials
  3. RCE via stacked queries

Detection Focus

  • SQL syntax errors in logs
  • Unexpected shell execution
  • WAF rule triggers

A04 – Insecure Design

Core Risk: Business logic and architectural weaknesses

MITRE ATT&CK Techniques

  • T1499 – Endpoint Denial of Service
  • T1110 – Brute Force
  • T1213 – Data from Information Repositories

Real-World Flow

  1. Abuse missing rate limits
  2. Enumerate accounts
  3. Mass data harvesting

Detection Focus

  • High-frequency request patterns
  • Logic abuse (valid requests, malicious intent)
  • API misuse metrics

A05 – Security Misconfiguration

Core Risk: Default or insecure settings

MITRE ATT&CK Techniques

  • T1580 – Cloud Infrastructure Discovery
  • T1082 – System Information Discovery
  • T1190 – Exploit Public-Facing Application

Real-World Flow

  1. Discover open admin interfaces
  2. Access debug endpoints
  3. Extract secrets/configs

Detection Focus

  • Access to admin/debug endpoints
  • Configuration file exposure attempts
  • Unexpected service enumeration

A06 – Vulnerable & Outdated Components

Core Risk: Known CVEs exploited

MITRE ATT&CK Techniques

  • T1190 – Exploit Public-Facing Application
  • T1210 – Exploitation of Remote Services
  • T1505.003 – Web Shell

Real-World Flow

  1. Exploit known CVE (e.g., Log4Shell)
  2. Deploy web shell
  3. Persistence achieved

Detection Focus

  • Known exploit signatures
  • Abnormal child processes
  • Web shell indicators

A07 – Identification & Authentication Failures

Core Risk: Account takeover

MITRE ATT&CK Techniques

  • T1110 – Brute Force
  • T1078 – Valid Accounts
  • T1539 – Steal Web Session Cookie

Real-World Flow

  1. Credential stuffing
  2. Session hijacking
  3. Account takeover

Detection Focus

  • Geo-impossible logins
  • MFA bypass attempts
  • Session reuse patterns

A08 – Software & Data Integrity Failures

Core Risk: Supply chain compromise

MITRE ATT&CK Techniques

  • T1195 – Supply Chain Compromise
  • T1059 – Command Execution
  • T1608 – Stage Capabilities

Real-World Flow

  1. Malicious dependency injected
  2. Code executes during build
  3. Backdoor deployed

Detection Focus

  • Unsigned builds
  • Unexpected CI pipeline changes
  • Integrity check failures

A09 – Logging & Monitoring Failures

Core Risk: Undetected compromise

MITRE ATT&CK Techniques

  • T1562 – Impair Defenses
  • T1070 – Indicator Removal on Host
  • T1027 – Obfuscated/Encrypted Payloads

Real-World Flow

  1. Disable logging
  2. Clear logs
  3. Persist undetected

Detection Focus

  • Gaps in telemetry
  • Sudden log volume drops
  • Disabled security agents

A10 – Server-Side Request Forgery (SSRF)

Core Risk: Internal service abuse

MITRE ATT&CK Techniques

  • T1190 – Exploit Public-Facing Application
  • T1046 – Network Service Discovery
  • T1552 – Unsecured Credentials

Real-World Flow

  1. SSRF to cloud metadata service
  2. Extract IAM credentials
  3. Pivot into cloud environment

Detection Focus

  • Requests to metadata IPs
  • Internal-only endpoint access
  • Abnormal outbound traffic

Visual Summary (Condensed)

OWASP CategoryMITRE ATT&CK Tactics
Access ControlPrivilege Escalation, Credential Access
Crypto FailuresCredential Access, Collection
InjectionInitial Access, Execution
Insecure DesignCollection, Impact
MisconfigurationDiscovery, Initial Access
Vulnerable ComponentsInitial Access, Persistence
Auth FailuresCredential Access
Integrity FailuresSupply Chain, Execution
Logging FailuresDefense Evasion
SSRFDiscovery, Lateral Movement

How to Use This Mapping Practically

🔵 Blue Team

  • Map OWASP risks → detection rules
  • Prioritize logging for ATT&CK techniques
  • Improve SIEM correlation

🔴 Red Team

  • Convert OWASP findings into ATT&CK chains
  • Report findings in ATT&CK language
  • Increase exec-level clarity

🟣 Purple Team

  • Design attack simulations
  • Validate SOC coverage
  • Measure MTTD/MTTR

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | AIMS Services | Security Risk Assessment Services | Mergers and Acquisition Security

At DISC InfoSec, we help organizations navigate this landscape by aligning AI risk management, governance, security, and compliance into a single, practical roadmap. Whether you are experimenting with AI or deploying it at scale, we help you choose and operationalize the right frameworks to reduce risk and build trust. Learn more at DISC InfoSec.

Tags: OWASP Top 10 Web Application Security Risks