Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Fix misconfigs, exposures, risks.
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Runtime Protection
In-app Firewall / WAF
Code Quality
soon
AI code quality review
Autonomous Pentests
soon
AI-driven attack testing
Defend
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanning
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Public Sector
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Trust Center
Safe, private, compliant
Learn
Software Security Academy
Students
Get Aikido free
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Aikido SafeChain
Prevent malware during install.
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
BlogContact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
PT
Login
Start for Free
No CC required
Learn
/
Compliance Frameworks Hub
/
Chapter 1Chapter 2Chapter 3

OWASP ASVS

4minutes read90

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter

TL;DR

OWASP ASVS is a detailed, community-driven checklist for verifying web app security—used by devs, testers, and architects.

Covers areas like AuthN, AuthZ, crypto, API security—split into L1 (basic) to L3 (critical apps).

Not a cert, but ideal for setting security baselines, guiding pen tests, or building secure apps from the ground up.

OWASP ASVS Scorecard Summary:

  • Developer Effort: Moderate to High (Requires understanding detailed security controls across many domains and implementing them correctly during development; used as a benchmark during testing).
  • Tooling Cost: Low to Moderate (Standard itself is free; costs relate to tools used for testing against ASVS requirements – SAST, DAST, IAST, pen testing tools).
  • Market Impact: High (Widely respected industry standard for web app security verification; often used as a basis for defining security requirements and testing scopes).
  • Flexibility: High (Levels allow tailoring based on risk; specific requirements can be deemed not applicable).
  • Audit Intensity: N/A (Not a formal audit standard for certification, but used during security assessments/tests which can be intense).

What is OWASP ASVS?

The OWASP Application Security Verification Standard (ASVS) is an open-source project providing a framework of security requirements and controls specifically for verifying the security of web applications. It serves two main purposes:

  1. For Developers: Provides a detailed list of security requirements to guide secure development practices.
  2. For Testers: Provides a basis for testing web application technical security controls during security assessments, penetration tests, or secure code reviews.

The OWASP ASVS is structured into chapters covering key security domains:

  • V1: Architecture, Design and Threat Modeling
  • V2: Authentication
  • V3: Session Management
  • V4: Access Control
  • V5: Validation, Sanitization and Encoding
  • V6: Stored Cryptography
  • V7: Error Handling and Logging
  • V8: Data Protection
  • V9: Communications Security
  • V10: Malicious Code
  • V11: Business Logic
  • V12: File and Resources
  • V13: API and Web Service
  • V14: Configuration

Within each chapter, specific verification requirements (controls) are listed. Crucially, the OWASP ASVS defines three Security Verification Levels (ASVS Levels), indicating increasing levels of depth and rigor:

  • Level 1 (Low Assurance): Intended for low-risk applications or as a first step. It focuses on easily detectable vulnerabilities and controls that can often be checked automatically (e.g., basic penetration testing). Every application should aim for at least Level 1.
  • Level 2 (Standard Assurance): Recommended for most applications, especially those handling sensitive data or performing important transactions. Requires more in-depth checks covering protection against common application security risks (like the OWASP Top 10). Requires both automated and manual testing, including design/code review elements.
  • Level 3 (High Assurance): For critical applications handling highly sensitive data (e.g., financial, health, government). Requires comprehensive security verification, including in-depth design review, code review, and rigorous testing to withstand skilled attackers.

The required level determines which specific verification requirements within each chapter must be met.

Why is it Important?

OWASP ASVS is a cornerstone of modern web application security because:

  • Provides Standardization: Offers a consistent, repeatable standard for what constitutes a secure web application, moving beyond ad-hoc testing.
  • Actionable Guidance: Gives developers concrete requirements and testers specific items to verify, bridging the gap between high-level principles and implementation.
  • Risk-Based Approach: The level system allows organizations to tailor verification efforts based on the application's risk profile.
  • Complements OWASP Top 10: While the Top 10 lists common risks, ASVS provides the detailed controls needed to mitigate those risks (and many others).
  • Industry Recognition: Widely respected and used globally by developers, security professionals, and organizations procuring software.
  • Supports Secure SDLC: Can be integrated throughout the SDLC – defining requirements, guiding design/coding, and forming the basis for verification testing.
  • Open Source & Community Driven: Freely available and constantly updated by a global community of security experts.

Using OWASP ASVS helps ensure that security testing is thorough, consistent, and focused on the controls that actually matter for protecting web applications.

What and How to Implement (Technical & Policy)

Implementing OWASP ASVS isn't about getting certified; it's about using the standard to build and verify secure applications:

  1. Determine Required Level: Based on the application's data sensitivity, business criticality, and regulatory requirements, choose the target ASVS Level (1, 2, or 3).
  2. Integrate into Requirements (Design Phase): Use the ASVS requirements for the chosen level (and relevant chapters) as input for security requirements during the design and planning phases.
    • Example (V4 Access Control): If building an app requiring different user roles, review ASVS Chapter V4 requirements like V4.1.1 ("Verify that the application enforces access control rules on a trusted service layer...") and design the system accordingly.
  3. Guide Development (Coding Phase): Developers use ASVS requirements as a checklist to ensure secure coding practices are followed.
    • Example (V5 Input Validation): When building input forms, refer to V5 requirements like V5.1.1 ("Verify that the application has defenses against HTTP parameter pollution...") and V5.2.1 ("Verify that structured data is strongly typed..."). Implement input validation libraries and routines that meet these requirements.
  4. Inform Security Testing (Verification Phase): Security testers (pen testers, code reviewers) use the ASVS checklist for the target level to structure their assessment. They verify whether each applicable requirement has been met.
    • Example (V2 Authentication): A tester verifying Level 2 would check requirements like V2.2.1 ("Verify minimum password length is 12 characters..."), V2.1.1 ("Verify that credentials are never stored in recoverable form..."), and V2.4.1 ("Verify that there is an account lockout mechanism...").
  5. Tooling Integration:
    • SAST/DAST Tools: Configure scanners to check for violations related to ASVS requirements (e.g., finding potential injection flaws related to V5).
    • Checklist Management: Use spreadsheets or tools like SecurityRAT to manage the ASVS requirements, track applicability, and record verification results.
  6. Documentation: Document how ASVS requirements were met (or why they were deemed not applicable) as part of design documents, code comments, and test reports.

Implementation is about actively using the ASVS list throughout the SDLC – as a guide for building securely and a checklist for verifying security.

Common Mistakes to Avoid

When using OWASP ASVS, be mindful of these common errors:

  1. Choosing the Wrong Level: Selecting Level 1 for a high-risk application, or aiming for Level 3 when resources only allow for Level 2 verification, leading to inadequate or incomplete assessments.
  2. Treating it as Just a Pentest Checklist: ASVS is broader than just pentesting; Levels 2 and 3 require design and code review aspects. Relying solely on dynamic scanning misses crucial vulnerabilities.
  3. Ignoring Applicability: Blindly trying to apply every single requirement without considering if it's relevant to the specific application's architecture, technology stack, or features.
  4. Lack of Developer Training: Expecting developers to meet ASVS requirements without training them on the underlying security concepts and secure coding practices needed.
  5. Inconsistent Application: Applying ASVS rigorously during one test but superficially during the next, leading to inconsistent security posture.
  6. Not Integrating Early: Only using ASVS at the very end for testing, rather than using it to inform secure design and development from the start (which is far more effective).
  7. Misinterpreting Requirements: Failing to understand the nuance or intent behind specific ASVS verification requirements.

What Auditors/Testers Will Ask (Developer Focus)

Security testers using OWASP ASVS will essentially ask developers (directly or via code/design review) to demonstrate how specific requirements are met:

  • (V1) "Can you show me the threat model for this application?" (1.1.1 - L2+)
  • (V2) "How are user passwords stored? Can you show the hashing implementation?" (2.2.2 - L1+)
  • (V3) "How are session tokens generated and protected against hijacking?" (3.1.1, 3.3.1 - L1+)
  • (V4) "Demonstrate how the application prevents a standard user from accessing admin functionality." (4.1.1, 4.1.2 - L1+)
  • (V5) "Show me the input validation routines used for this critical API endpoint." (5.1.3, 5.2.1 - L1+)
  • (V6) "Where and how are cryptographic keys managed within the application?" (6.2.1 - L2+)
  • (V7) "How does the application handle errors without leaking sensitive information?" (7.1.1 - L1+)
  • (V8) "How is sensitive data protected when stored in the database (encryption, masking)?" (8.1.1 - L2+)
  • (V13) "How is authentication and authorization handled for API requests?" (13.1.1, 13.2.1 - L1+)

They will seek concrete evidence in the code, configuration, design documents, or running application to verify compliance with each relevant ASVS requirement for the target level.

Quick Wins for Development Teams

Developers can start incorporating OWASP ASVS principles easily:

  1. Focus on Level 1 Basics: Start by reviewing and implementing Level 1 requirements in key areas like Authentication (V2), Access Control (V4), and Input Validation (V5). These cover many common flaws.
  2. Use Secure Framework Defaults: Leverage built-in security features of your web framework (e.g., for session management, CSRF protection, output encoding) which often align with ASVS.
  3. Validate and Encode: Consistently validate all input and encode all output destined for browsers, APIs, or databases. (Core of V5)
  4. Implement Basic Logging: Ensure key security events (logins, failures, significant transactions) are logged. (Core of V7)
  5. Review OWASP Top 10: Understand the Top 10 risks and how ASVS controls help mitigate them.
  6. Use SAST Tools: Configure SAST tools to flag violations related to common ASVS requirements (e.g., insecure password handling, potential injection points).

Ignore This And... (Consequences of Non-Compliance)

Ignoring the principles and requirements outlined in OWASP ASVS means neglecting fundamental web application security controls. The consequences are direct:

  • Higher Likelihood of Breaches: Applications will be more vulnerable to common attacks like XSS, SQL Injection, Broken Authentication, Broken Access Control, etc. (directly related to ASVS chapters).
  • Data Loss/Theft: Vulnerabilities allow attackers to steal sensitive user data, leading to privacy violations and regulatory fines (e.g., GDPR).
  • Service Disruption: Attacks can take applications offline, causing business disruption and revenue loss.
  • Reputational Damage: Security incidents erode customer trust and damage the company's brand.
  • Failed Security Audits/Pentests: If customers or partners require security testing, an application not built with ASVS principles in mind will likely fail, potentially blocking deals or deployments.
  • Increased Remediation Costs: Finding and fixing vulnerabilities late in the cycle or after a breach is far more costly than building security in using ASVS as a guide.

Essentially, not adhering to OWASP ASVS means building inherently insecure web applications.

FAQ

Is OWASP ASVS a compliance standard like SOC 2 or ISO 27001?

No. OWASP ASVS is a verification standard, essentially a detailed checklist for testing web application security. It doesn't involve formal audits or certifications like SOC 2 or ISO 27001, which cover broader management systems. However, meeting ASVS levels can help satisfy technical control requirements within those broader frameworks.

What's the difference between OWASP ASVS and OWASP Top 10?

The OWASP Top 10 lists the ten most critical web application security risks based on community consensus and data. OWASP ASVS provides the detailed security controls and verification requirements needed to prevent and test for those risks (and many others). Top 10 tells you what the major problems are; ASVS tells you how to verify your defenses against them.

Which ASVS Level should we aim for?

It depends on risk. Level 1 is the minimum baseline for all apps. Level 2 is recommended for most applications handling sensitive data or transactions. Level 3 is for highly critical applications where failure has severe consequences (e.g., financial, health data).

Do we need to meet 100% of the requirements for a specific level?

Generally, yes, for all applicable requirements. The standard allows for requirements to be marked as "Not Applicable" if they genuinely don't apply to the application's technology or functionality, but this requires justification. Compensating controls can sometimes be accepted if a specific requirement cannot be met directly.

Is ASVS only for penetration testing?

No. While heavily used in penetration testing (especially Level 1), ASVS Levels 2 and 3 explicitly require verification beyond dynamic testing, including reviews of architecture, design, and source code. It's intended for holistic application security verification.

How often should we verify against ASVS?

Verification should be integrated into the SDLC. This might mean checking relevant requirements during code reviews, running automated tests aligned with ASVS in CI/CD, and performing full ASVS assessments (at the target level) before major releases or periodically (e.g., annually) for critical applications.

Can ASVS be used for APIs and mobile apps?

OWASP ASVS Chapter V13 specifically addresses API and Web Service verification. While primarily focused on web applications, many principles apply broadly. For mobile specifics, OWASP also has the Mobile Application Security Verification Standard (MASVS).

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Jump to:
Text Link

Security done right.
Trusted by 25k+ orgs.

Start for Free
No CC required
Book a demo
Share:

www.aikido.dev/learn/software-security-tools/owasp-asvs

Table of contents

Chapter 1: Understanding Compliance Frameworks

What Are Compliance Frameworks and Why Do They Matter?
How Compliance Frameworks Affect DevSecOps Workflows
Common Elements Across Frameworks

Chapter 2: Major Compliance Frameworks Explained

SOC 2 Compliance
ISO 27001
ISO 27017 / 27018
NIST SP 800-53
NIST SSDF (SP 800-218)
OWASP ASVS
GDPR
NIS2 Directive
DORA
EU Cyber Resilience Act (CRA)
CMMC
PCI DSS
FedRAMP
HIPAA / HITECH
Essential Eight
Singapore CCoP (for CII)
Japan Cybersecurity Act & Related (APPI)

Chapter 3: Implementing Compliance in Development

Choosing the Right Frameworks for Your Organization
Building Compliant DevSecOps Pipelines
Training Development Teams for Compliance
Audit Preparation for Developers
Maintaining Compliance Long-Term
The End

Related blog posts

See all
See all
June 4, 2024
•
Compliance

SOC 2 certification: 5 things we learned

What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.

January 16, 2024
•
Compliance

NIS2: Who is affected?

Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.

December 5, 2023
•
Compliance

ISO 27001 certification: 8 things we learned

What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.

Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group CompaniesFor Government & Public SectorFor Smart Manufacturing & Engineering
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant