Skip to content
arrow_back
search
ISM-1850 policy ASD Information Security Manual (ISM)

Mitigate OWASP Top 10 in Web Applications

Developers need to address the OWASP Top 10 security risks in web applications to enhance security.

record_voice_over

Plain language

When you're building a website or an online service, you need to pay attention to the top security risks that can cause trouble, like data breaches or hacking attempts. If these risks aren't addressed properly, your site could be vulnerable to attacks that compromise your users’ information, damage your reputation, and cost you a lot of money.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The OWASP Top 10 are mitigated in the development of web applications.
policy ASD Information Security Manual (ISM) ISM-1850
priority_high

Why it matters

Failing to mitigate OWASP Top 10 risks (e.g., injection, XSS, access control flaws) can cause web app compromise, data leakage and service disruption.

settings

Operational notes

Bake OWASP Top 10 mitigations into SDLC: secure coding standards, threat modelling, SAST/DAST, dependency scans, and regular remediation of findings and retesting.

Mapping detail

Mapping

Direction

Controls