OWASP Top 10 2021 Adds Two New Web Application Risk Categories

3 views 3 minutes read

OWASP Top 10 2021 adds two new risk categories that reset priorities for web application security. The update reflects testing data and observed attack behavior. It also clarifies category names to match current threat patterns and controls.

The new entries, Insecure Design and Software and Data Integrity Failures, push security earlier into architecture and across the software supply chain. The changes mirror lessons from recent incidents.

For builders and defenders, OWASP Top 10 2021 remains a practical baseline for controls, training, and testing, aligned with widely used standards.

OWASP Top 10 2021: What You Need to Know

  • OWASP Top 10 2021 centers security on design quality and supply chain integrity across modern web stacks.

What Changed in OWASP Top 10 2021

OWASP Top 10 2021 is a data driven refresh of the widely used web application risk list. The headline change is the addition of two categories, Insecure Design and Software and Data Integrity Failures, supported by large scale testing inputs from the community. Category names were updated to clarify scope and align with current practice.

The list emphasizes that design flaws can be as dangerous as implementation bugs. It also addresses growing supply chain risk where build steps, dependencies, and update mechanisms can be subverted. These themes track real incidents and complement guidance from standards bodies.

Editor’s Picks: Security Resources

Assess and harden with widely adopted tools:

  • Tenable Nessus vulnerability assessment for web apps and infrastructure.
  • Bitdefender endpoint protection against malware and exploits.
  • 1Password password management and secrets security.
  • IDrive backups to protect critical data and configurations.
  • Tresorit encrypted cloud storage aligned with privacy-by-design.
  • EasyDMARC email security and domain protection.

Two New Categories, Explained

Insecure Design OWASP

OWASP Top 10 2021 elevates architectural weaknesses with Insecure Design OWASP. The category focuses on missing or ineffective security controls at the design stage, such as weak threat modeling, insecure patterns, and flawed requirements.

These issues differ from code defects. They require rethinking product requirements, structured design reviews, and adoption of secure-by-design patterns.

Software Data Integrity Failures

Software Data Integrity Failures addresses weaknesses in update mechanisms, CI and CD pipelines, and dependency trust. OWASP Top 10 2021 underscores that unverified code, tampered packages, or misconfigured pipelines can compromise entire applications.

Signed artifacts, verified dependencies, and controlled release processes are essential for integrity. For a related case study, see this analysis of an NPM supply chain attack.

Renames and Reordering

OWASP Top 10 2021 refines category names for clarity and better mapping to controls. For example, Sensitive Data Exposure is now Cryptographic Failures, and Broken Authentication is now Identification and Authentication Failures.

The update also reflects shifts in prevalence and exploitability, with access control and misconfiguration risks remaining prominent across cloud native environments.

Why OWASP Top 10 2021 Matters

OWASP Top 10 2021 guides secure design, coding, and testing and informs training and governance. It is a baseline for secure SDLC programs, procurement criteria, and compliance mappings.

For a broader industry context, see the NIST Secure Software Development Framework and the OWASP project page for the OWASP Top 10. The update also aligns with vulnerability management and incident readiness. Explore recent issues in this roundup of critical vulnerabilities.

Implications for Security and Development Teams

The strongest advantage of OWASP Top 10 2021 is shared focus. It aligns engineering, AppSec, and leadership on the most impactful web risks.

Teams can emphasize secure design patterns, adopt architectural guardrails, and reduce classes of defects. Integrating threat modeling early and automating trust checks in the supply chain can materially lower exposure.

A key limitation is misuse as the only standard. OWASP Top 10 2021 does not replace threat led risk assessments or domain specific controls. Organizations that over index on the Top 10 can miss context specific threats or API and mobile nuances.

Use it as a foundation, then expand to deeper testing and tailored controls. For practical defense guidance, see these steps to defend against ransomware.

Recommended Tools to Act on OWASP Top 10 2021

Operationalize controls with these solutions:

Conclusion

OWASP Top 10 2021 highlights where many web risks originate, in architectural decisions and in software supply chain integrity. Treat both as first class security concerns.

Combine secure-by-design practices with strong dependency and pipeline controls to meet the spirit of the list, not only the letter. Align governance, training, and testing with these priorities.

Use OWASP Top 10 2021 as a baseline for prioritization, then extend to deeper threat modeling and continuous validation across your environment. Update controls as attacker tactics evolve.

Questions Worth Answering

What is new in OWASP Top 10 2021?

Two categories debut, Insecure Design and Software and Data Integrity Failures, which elevate architecture and supply chain risks.

Why did OWASP emphasize design risks?

Design flaws create systemic weaknesses that patches cannot fix later. Addressing them early removes entire classes of issues.

How does the update affect developers?

It shifts priorities toward threat modeling, secure design patterns, and dependency trust beyond code level fixes.

How should security teams respond?

Map controls to the new categories, strengthen CI and CD integrity, expand logging, and validate access controls across apps and APIs.

Is OWASP Top 10 2021 a compliance standard?

No. It is a widely used baseline for risk awareness and prioritization, often referenced by standards and procurement policies.

Where can I read the official list?

Visit the OWASP project page for details, examples, and guidance, OWASP Top 10.

Does the update include supply chain guidance?

Yes. Software and Data Integrity Failures covers untrusted updates, tampered dependencies, and pipeline weaknesses.

About OWASP

The Open Worldwide Application Security Project is a nonprofit foundation focused on improving software security through community projects.

OWASP produces resources such as the OWASP Top 10, cheat sheets, testing guides, and secure coding tools used across the industry.

Global volunteers contribute data, research, and best practices that help teams manage real world risks across the software lifecycle.

More Security Resources

Explore additional tools and services:

  • Optery automate personal data removal from data brokers.
  • Plesk hosting control panel with robust hardening options.
  • CloudTalk business calling with admin controls and insights.
Special Picks: Strengthen endpoints with Bitdefender, manage secrets with 1Password, and audit vulnerabilities with Tenable Nessus.

Leave a Comment

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More