Business Logic Security

V11.1.1

Verify that the application will only process business logic flows for the same user in sequential step order and without skipping steps.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 841

V11.1.2

Verify that the application will only process business logic flows with all steps being processed in realistic human time, i.e. transactions are not submitted too quickly.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 799

V11.1.3

Verify the application has appropriate limits for specific business actions or transactions which are correctly enforced on a per user basis.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 770

V11.1.4

Verify that the application has anti-automation controls to protect against excessive calls such as mass data exfiltration, business logic requests, file uploads or denial of service attacks.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 770

V11.1.5

Verify the application has business logic limits or validation to protect against likely business risks or threats, identified using threat modeling or similar methodologies.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 841

V11.1.6

Verify that the application does not suffer from "Time Of Check to Time Of Use" (TOCTOU) issues or other race conditions for sensitive operations.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 367

V11.1.7

Verify that the application monitors for unusual events or activity from a business logic perspective. For example, attempts to perform actions out of order or actions which a normal user would never attempt. (C9)

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 754

V11.1.8

Verify that the application has configurable alerting when automated attacks or unusual activity is detected.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 390

Disclaimer:

Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.

Github logo View source on GitHub

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.