Example Compliance Audit Report OWASP ASVS L2
Example Compliance Audit Report OWASP ASVS L2
Example Compliance Audit Report OWASP ASVS L2
777
E-mail: security@softseq.com
Visit us at www.softseq.com
Compliance
Audit Report
OWASP
Application Security Verification Standard
version 3.0.1, Level 2
Customer: {customer}
Page 1 of 7
Executive summary - audit findings
69 vulnerabilities were found. They are charted below by impact, calculated via CVSS standard:
Instruction injections
A way was found to download any files from {product} media server, including system files. This
could allow a hacker to steal {product} users’ data and obtain direct access to the media server.
A way was found to modify other companies and users’ data, to compromise accounts
completely, and steal marketing strategies or users’ personal data.
Cross-site scripting
A way was found to inject hacker-supplied code in {product} application. An attacker could craft
code to send him {product} users’ data, perform unauthorized actions, and disclose passwords.
All identified issues have been fixed, and all fixes re-tested to ensure robustness of the final solution.
Page 2 of 7
Introduction
{customer} retained the services of the SoftSeq LLC to perform application security audit of {customer}
{product} solution according to the requirements of OWASP Application Security Verification Standard
3.0.1.
This document describes the timing, scope and methodologies taken during the security assessment and
audit.
The assessment relies on information gathered from Q&A, additional meetings with technical staff,
project’s documentation, as well as on the results of manual and automatic testing of specific threat
scenarios. It included theoretical and practical assessment methodologies, best practices used to
mitigate potential threats and techniques of attacks performed by a malicious entity (e.g. hacker,
internal attacker, spyware, virus, etc.).
OWASP ASVS 3.0.1 Level 2 had been chosen as an audit baseline, and is a superset of:
To this end, requirements of OWASP Application Security Verification Standard 3.0.1 Level 2 were
strictly adhered to.
Verifying that authentication & authorization controls are implemented properly in the
application.
Inspecting business logic at the design and implementation levels.
Detecting security vulnerabilities at the application level, which could potentially jeopardize
{customer} customers’ systems and data that is processed and/or stored in {product}.
Reviewing the security practices used in configuration of the databases, application servers, and
other application-supporting components, modules, or integrated third party components.
Providing mitigating controls for secured design, implementation and configuration of the
product.
1. Analysis of the product structure, interfaces, data flow, sensitive modules, infrastructure and
architectural aspects, reliance on third party products or interfaces, and identifying classes of
vulnerabilities.
Page 3 of 7
2. Information gathering from various sources - human and technological. This included
communicating with both technical people and management.
3. Hands-on testing of the product in various scenarios, with respect to previously obtained
knowledge of the product and its data flow scenarios.
4. Analysis of gathered data and results from the previous security assessments. The analysis
includes categorizing the detected vulnerabilities and prioritizing them according to the business
and technical context of the application.
5. A final and comprehensive report of the security review activity, summarizing the entire review
process, the methodology and the detailed findings.
SoftSeq security assessment addressed the review of security controls in different product layers such as
the application architecture, design, implementation and secure deployment. The following product
areas and mechanisms were assessed according to OWASP ASVS Level 2 categories:
Page 4 of 7
V10: Communications security 1, 3, 6, 10, 11, 13, 14, 15, 16 Compliant
Each area/component was reviewed and inspected for potential and actual security flaws that might
allow various attacks by external attackers, internal attackers or malicious system users, such as, but not
limited to:
For a complete list of security requirements audited in scope of this engagement, please refer to OWASP
Application Security Verification Standard 3.0.1, Level 2.
Page 5 of 7
Audit Results
A number of corrective actions have been identified to resolve noncompliance of {customer} {product}
with OWASP ASVS 3.0.1 Level 2 requirements.
The security audit findings were communicated by SoftSeq LLC to {customer} Software Architect and
development team via a dedicated project tracking tool (Jira).
{customer} has taken meaningful steps to remediate all findings in order to improve the system’s
security posture, and eliminate noncompliance with OWASP ASVS 3.0.1 Level 2 requirements.
{customer} {product} version 28250:853eec989233 has been verified to comply with all OWASP ASVS
3.0.1 Level 2 requirements.
Limitations
The SoftSeq security engagement was based on past experiences, available information, and known
threats at the time the work was conducted.
As technologies and risks change over time, the vulnerabilities associated with the operation of
{customer} products included in the Security Review report, as well as the actions necessary to reduce
the exposure to such vulnerabilities may change.
All information systems, which are designed by, and, therefore, dependent on human beings, are always
vulnerable to some degree.
Confidentiality Notice
The provided information is considered {customer} confidential information and is subject to the
confidentiality agreement signed between the parties.
The receiving party should keep the information within this document taking appropriate measures to
avoid its disclosure to unauthorized persons.
SoftSeq is specializing in Application Security Engineering and provides end to end solutions to
enterprises of all sizes for building Secure Software Systems and Products.
https://softseq.com/
Page 6 of 7
Appendix A
Product Name Product Version Engagement period
Appendix B
An exhaustive listing of all OWASP ASVS 3.0.1 Level 2 requirements satisfied, their individual audit
findings, and corrective actions implemented are presented in a separate spreadsheet supplied with this
report.
Page 7 of 7