Home > taxonomy > asvs 4.0.3 > 01 architecture design and threat modeling > 11 business logic architecture
Business Logic Architecture V1.11.1 Verify the definition and documentation of all application components in terms of the business or security functions they provide.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 1059
V1.11.2 Verify that all high-value business logic flows, including authentication, session management and access control, do not share unsynchronized state.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 362
V1.11.3 Verify that all high-value business logic flows, including authentication, session management and access control are thread safe and resistant to time-of-check and time-of-use race conditions.
Level 1 required: False
Level 2 required: False
Level 3 required: True
CWE: 367
Disclaimer: Credit via OWASP ASVS . For more information visit The OWASP ASVS Project or Github respository. . OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.
OWASP Cornucopia
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use. OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.