Purpose limitation
Define the defensive purpose before collecting data. Stop when the purpose is met.
OBSERVA
Control coverage across OWASP, ISO, SOC 2, GDPR, NIS2 and governance.
Based on mock control coverage and status.
Written scope and authorization
Data classification and minimization
Evidence retention policy
Access control for case files
Export approval workflow
Review of cross-border data transfer
Bias and human-rights review for sensitive research
Incident audit trail
Define the defensive purpose before collecting data. Stop when the purpose is met.
Assess only systems, accounts and data you own or have explicit permission to review.
Collect the least sensitive evidence that can answer the question.
Match collection and response actions to risk, urgency and legal basis.
Log who did what, when, why and with what evidence.
Keep human approval for sensitive, irreversible or legally significant actions.
OWASP Top 10
Role tests exist; object-level checks need broader negative coverage.
Owner: Application Security
Next: Add deny-by-default policy tests for sensitive objects.
ISO 27001
Incident runbooks and escalation owners are documented.
Owner: Security Governance
Next: Schedule next tabletop exercise.
SOC 2
Quarterly review in place; service account inventory needs cleanup.
Owner: IT Operations
Next: Reconcile service accounts with business owners.
GDPR
PII logging patterns reduced; export logs need retention review.
Owner: Privacy
Next: Validate retention and masking for export workflows.
NIS2
Draft policy exists but training completion is incomplete.
Owner: Governance
Next: Complete awareness rollout and evidence capture.
Governance
Identity and payment vendors reviewed; telemetry vendors pending.
Owner: Procurement Security
Next: Complete evidence requests for telemetry vendors.
a01 / critical
Users can act outside intended permissions when server-side authorization is incomplete.
Business risk: Data exposure, unauthorized changes and privilege abuse.
Safe scenario: A local demo app verifies that user A cannot fetch user B's invoice.
Related: SameSite cookies, CSRF protection, Audit logging
a02 / high
Sensitive data is insufficiently protected in transit, at rest or during processing.
Business risk: Confidential data disclosure and regulatory impact.
Safe scenario: Review certificate expiry and HSTS on an owned website.
Related: Strict-Transport-Security, Secure cookies
a03 / critical
Untrusted input is interpreted as commands, queries or executable content.
Business risk: Data manipulation, unauthorized access and system compromise.
Safe scenario: Unit-test a local repository function to confirm parameters are bound, not concatenated.
Related: Content-Security-Policy, Input schemas
a04 / high
The design lacks controls needed to resist expected abuse cases.
Business risk: Systemic weaknesses that patches alone cannot fix.
Safe scenario: Run a tabletop exercise for password reset abuse on a mock flow.
Related: Rate limiting, Step-up authentication
a05 / high
Unsafe defaults, missing headers, verbose errors or exposed admin surfaces increase risk.
Business risk: Avoidable exposure and easier abuse of other weaknesses.
Safe scenario: Run the OBSERVA header analyzer against an owned staging domain.
Related: CSP, HSTS, X-Frame-Options, Permissions-Policy
a06 / high
Known vulnerable dependencies or unsupported platforms remain in use.
Business risk: Known vulnerabilities become practical paths to compromise.
Safe scenario: Review dependency advisories in CI for a private repository.
Related: SBOM, Dependency lockfile review
a07 / critical
Authentication or identity lifecycle controls are weak or inconsistent.
Business risk: Account takeover and unauthorized access.
Safe scenario: Map a mock account recovery flow and identify abuse paths.
Related: HttpOnly cookies, Secure cookies, SameSite
a08 / high
Code, updates or data can be modified without sufficient integrity controls.
Business risk: Supply chain compromise and unauthorized changes.
Safe scenario: Review a toy CI workflow for overbroad permissions.
Related: Subresource Integrity, Protected branch rules
a09 / medium
Security-relevant events are missing, incomplete or not reviewed.
Business risk: Incidents remain undetected or hard to investigate.
Safe scenario: Create mock detection rules for suspicious login and recovery changes.
Related: Audit logs, SIEM routing, Retention policy
a10 / high
A server is tricked into making unintended outbound requests.
Business risk: Internal metadata exposure or unexpected network access.
Safe scenario: Review code paths that fetch user-provided URLs without sending requests to real third-party systems.
Related: Egress firewall, URL allowlists