Skip to main content

How does amaise protect against the OWASP Top 10?

Written by amaise Support

How does amaise protect against the OWASP Top 10?

amaise systematically addresses all 10 categories of the OWASP Top 10 (2021):

  • A01 Broken access control: 11 roles, 38 permissions, row-based tenant separation, object-based authorization per entity, stateless sessions.

  • A02 Cryptographic failures: TLS 1.2+/1.3, AES-256 at all storage levels, tenant-specific encryption keys, no local password storage.

  • A03 Injection: Only type-safe queries (no raw SQL), WAF injection patterns, Vue auto-escaping, secure deserialization.

  • A04 Insecure design: Layered architecture, CSRF protection, rate limiting.

  • A05 Security misconfiguration: IaC scanning, isolated management ports, no default credentials, schema validation.

  • A06 Vulnerable components: Automatic dependency checks (CVSS ≥ 7 blocks build), continuous monitoring.

  • A07 Authentication failures: OAuth2/OIDC, MFA, JWT validation with issuer whitelist.

  • A08 Data integrity failures: CI/CD gates, secret scanning, secure deserialization.

  • A09 Logging failures: Audit trail, CloudTrail, real-time error tracking.

  • A10 SSRF: IMDSv2 enforced, no custom URLs, WAF, VPC isolation.

Did this answer your question?