Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

OWASP Top 10: Insecure Design

22. 02. 2023 Updated: 24. 03. 2026 1 min read intermediate
This article was published in 2023. Some information may be outdated.

Insecure Design is a category of vulnerabilities that cannot be fixed by implementation alone. The problem is in the architecture. No patch can fix bad design.

Examples of Insecure Design

  • Password reset via security questions
  • E-shop without limits on coupon codes
  • API without rate limiting on sensitive endpoints
  • Authentication via SMS without an alternative (SIM swap)

Threat Modeling — STRIDE

  • Spoofing — impersonating another identity
  • Tampering — unauthorized modification
  • Repudiation — denying an action
  • Information Disclosure — information leakage
  • Denial of Service — making service unavailable
  • Elevation of Privilege — privilege escalation

Secure by Design Principles

  1. Defense in depth — multiple layers of protection
  2. Least privilege — minimum necessary permissions
  3. Fail secure — lock down on failure, don’t open up
  4. Separation of duties
  5. Trust boundaries — clear boundaries of trust

Threat Model as Code

OWASP Top 10: Insecure Design

application: e-shop data_flows: - name: user_login source: browser destination: auth_service threats: - type: spoofing mitigation: MFA + rate limiting - type: information_disclosure mitigation: TLS 1.3, no password in logs

Key Takeaway

Security starts in the design, not in the code. Do threat modeling before the first line of code.

owaspsecuritydesignthreat modeling
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.