AUTHENTICATION (AT9)

Claudia can undertake more critical functions because authentication requirements are too weak (e.g. do not use strong authentication such as two factor), or there is no requirement to re-authenticate for these

AUTHENTICATION
9

Claudia can undertake more critical functions because authentication requirements are too weak (e.g. do not use strong authentication such as two factor), or there is no requirement to re-authenticate for these

OWASP SCP

55,56

OWASP ASVS

1.4.5,2.1.6,2.2.4,4.1.3,4.3.3

OWASP AppSensor

CAPEC

-

SAFECODE

14,28

How to play?

The level of assurance required for confirmation of identity should be assessed. In some cases different levels of authentication may be needed (e.g. two-factor authentication for some users, but not others), and re-authentication should be considered for some important functionality (e.g. changing password, making a payment, deleting an account), especially where weaknesses have been accepted to reduce application friction for users (e.g. having longer session timeouts, allowing guest check-out, having remember-me functionality).

Mappings

OWASP ASVS (4.0): 1.4.5 ,2.1.6 ,2.2.4 ,4.1.3 ,4.3.3

Capec: 21

OWASP SCP: 55,56

OWASP Appsensor:

Safecode: 14,28

ASVS (4.0) Cheatsheetseries Index

ASVS V1.4 - Access Control Architectural Requirements

ASVS V2.1 - Password Security Requirements

ASVS V2.2 - General Authenticator Requirements

ASVS V4.1 - General Access Control Design

ASVS V4.3 - Other Access Control Considerations

No suitable mappings were found.

Attacks

Credential Stuffing

Weak Authentication Protocols

Insider Threats

Session Hijacking (Man-in-the-Middle)

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.