Skip to content
arrow_back
search
ISM-1849 policy ASD Information Security Manual (ISM)

Implement OWASP Top 10 in Web Development

Use OWASP Top 10 controls to secure web applications during development.

record_voice_over

Plain language

When building a website or online service, it is important to use known security practices to protect against common threats. The OWASP Top 10 is a list of the most common web application security risks, and by using it, developers can avoid serious issues like data breaches that could harm customers and damage the company's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The OWASP Top 10 Proactive Controls are used in the development of web applications.
policy ASD Information Security Manual (ISM) ISM-1849
priority_high

Why it matters

If OWASP Top 10 Proactive Controls are not implemented, web apps are more likely to ship with common flaws, increasing risk of compromise and data loss.

settings

Operational notes

Embed OWASP Top 10 Proactive Controls in requirements, code review checklists and CI testing (SAST/DAST), and track remediation of findings each sprint.

Mapping detail

Mapping

Direction

Controls