Vulnerability Categories

OWASP Top 10

  1. Broken Access Control
  2. Cryptographic Failures
  3. Injection
  4. Insecure Design
  5. Security Misconfiguration
  6. Vulnerable and Outdated Components
  7. Identification and Authentication Failures
  8. Software and Data Integrity Failures
  9. Security Logging and Monitoring Failures
  10. Server-Side Request Forgery (SSRF)


What metrics can be used to evaluate the effectiveness of a process?

No safe is perfect, but there are known realistic lower bounds on the time required to breach or manipulate various models. So you might have a safe good for 30 minutes. What good is that? You now know that you need a burglar alarm with a < 29 minute response!
Matt Blaze
Coverage of real world vulnerabilities
Would the process have discovered the vulnerability?
Coverage of known vulnerable application
Generate applications with random occurrences and variations of vulnerabilities. Measure the time taken and completeness of the process.