Security Standards
Description
This extension provides the CAST rule tags that will be used to contribute to the various technical criteria provided by the extension, thereby allowing specific grades and rule violations to be reported.
Supported indexes/standards
OWASP top 10 application security risks as technical criteria grades
CWE top 25 application security risks as technical criteria grades
- CWE TOP 25 2025
- CWE TOP 25 2024
- CWE TOP 25 2023
- CWE TOP 25 2022
- CWE TOP 25 2021
- CWE TOP 25 2020
- CWE TOP 25 2019
- CWE TOP 25 2011
All CWE
PCI-DSS security risks as technical criteria grades
- PCI-DSS-V4.0
- PCI-DSS-V3.2.1
- PCI-DSS-V3.1
CWE Mapping & Data Propagation Logic
Note on Data Evolution since version 20260330.0.0-funcrel
To ensure maximum accuracy and coverage, we have implemented a propagation system for CWE-to-QR (Quality Rule) mapping. Because the MITRE Top 25 includes high-level abstractions CWE ID (specifically a Pillar), we designed this mechanism to aggregate data from all descendant levels. This ensures that sections associated with a high-level category—which could have been previously empty—now accurately reflect the cumulative violations of quality rules decorated with descendant CWE IDs.
The Hierarchy & Impact
-
Populated High-Level Views: Data now flows logically upward through all five abstraction levels of the CWE hierarchy:
Variant → Base → Class → Category → Pillar -
Comprehensive Reporting: Sections associated with Pillars, Categories, or Classes are now fully populated with the violations of their respective Base and Variant descendants.
-
Mapping Best Practices: While the report aggregates data at the top three levels for visibility, Quality Rules remain mapped at the Base or Variant levels to maintain technical precision, as recommended by MITRE.
Compatibility
| Product | Release | Supported |
|---|---|---|
| CAST Engineering Dashboard | ≥ 1.5 | ✅ |
| CAST Health/Management Dashboard | ≥ 1.17 | ✅ |
| CAST Security Dashboard | ≥ 1.20 | ✅ |
Download and installation instructions
The extension will not be automatically downloaded and installed. If you need to use it, should manually install the extension.
Configuration requirements
Generate a snapshot
A new snapshot must be generated (after the extension is installed) before results can be viewed. If you do not immediately see changes in the dashboard, please consider restarting the dashboard service and/or emptying your browser cache.
Engineering Dashboard
Tiles
Out of the box, no tiles will be provided to display data for this extension, however it is possible to create tiles manually to display Violation data directly from this extension using the Industry Standard/s tile plugin in v. ≥ 1.18 of the Engineering Dashboard. See Engineering Dashboard tile management for more information.
Clicking on the tile navigates to Risk investigation view and the specified Industry Standard will be selected in the Health Factor table.
Health Dashboard
Out of the box, no tiles will be provided to display data for this extension, however it is possible to create tiles manually to display Grade, Compliance, and Violation data directly from this extension using the Industry Standard/s tile plugin in v. ≥ 1.17 of the Health Dashboard. See Health Dashboard tile management for more information. Clicking on any of these tiles will display a list of the rules that have been tagged with the specified standard as provided by the extension. Compliance percentage is also displayed in a “bubble”.
Example for cmp.json
Configuration to create a “gauge” tile at portfolio level (multi-app level) to show an OWASP-2017 A1-2017 tile:
{
"id": 1234,
"plugin": "IndustryStandards",
"color": "black",
"parameters": {
"type": "OWASP-2017",
"title": "OWASP-2017 A1-2017",
"widget": "gauge",
"industryStandard": {
"id": "1062321",
"indexID": "1062320",
"mode": "grade",
"format": "0.00",
"description": "OWASP-2017 A1-2017, in grade format"
}
}
}
Example for app.json
Configuration to create a “number of violations” tile at application level (single app level) to show an OWASP-2017 A1-2017 tile:
{
"id": 1236,
"plugin": "IndustryStandard",
"color": "orange",
"parameters": {
"type": "OWASP-2017",
"title": "OWASP-2017 A1-2017",
"industryStandard": {
"id": "1062321",
"indexID": "1062320",
"mode": "violations",
"format": "0,000",
"description": "OWASP-2017 A1-2017, in number of violations format"
}
}
}
What results can you expect?
Once the analysis/snapshot generation has completed, you can view the results in the dashboards:
Assessment Model
Various Business and Technical Criteria will be added by the extension:
OWASP
| ID | Name | Type |
|---|---|---|
| 1062340 | OWASP-2021 | Business Criterion |
| 1062320 | OWASP-2017 | Business Criterion |
| 1062300 | OWASP-2013 | Business Criterion |
CWE
| ID | Name | Type |
|---|---|---|
| 1066007 | CWE-Index | Business Criterion |
| 1066006 | CWE-Top25-2024 | Business Criterion |
| 1066005 | CWE-Top25-2023 | Business Criterion |
| 1066004 | CWE-Top25-2022 | Business Criterion |
| 1066003 | CWE-Top25-2021 | Business Criterion |
| 1066002 | CWE-Top25-2020 | Business Criterion |
| 1066001 | CWE-Top25-2019 | Business Criterion |
| 1066000 | CWE-Top25-2011 | Business Criterion |
PCI DSS
| ID | Name | Type |
|---|---|---|
| 1063002 | PCI-DSS-V4 | Business Criterion |
| 1063001 | PCI-DSS-V3.2.1 | Business Criterion |
| 1063000 | PCI-DSS-V3.1 | Business Criterion |
Engineering Dashboard
Out of the box, results are displayed in a specific interface - click the relevant Assessment Model option to view the results:

For example, for OWASP 2013 and 2017:


Health Dashboard
Out of the box, no results are provided. Tiles can be configured manually as described above.
Security Dashboard
Out of the box, OWASP results are displayed in a specific interface - click either the OWASP-2013 or OWASP-2017 Assessment Model options (after clicking the Risk Investigation tile in the Application home page) to view the results:

RestAPI
The RestAPI can be used to query both the Dashboard (AED) and Measurement (AAD) schemas for results, for example for OWASP results:
