WikiFrameworksCyberSecure CanadaDefine OWASP ASVS Level

Define OWASP ASVS Level

Updated: 2026-02-24

Plain English Translation

The organization must evaluate its websites and web applications to determine the appropriate depth of security testing required. Using the OWASP Application Security Verification Standard (ASVS), the organization assigns a specific testing level (Level 1, 2, or 3) to each site based on its risk profile and data sensitivity.

Executive Takeaway

Defining an OWASP ASVS level ensures security testing aligns proportionally with the risk and data sensitivity of each web application.

ImpactMedium
ComplexityLow

Why This Matters

  • Optimizes security resources by applying the right level of testing and verification where it is needed most.
  • Protects sensitive data by mandating deeper security verification for high-risk transactional applications.
  • Sets clear, standardized security expectations for internal developers and external vendors.

What “Good” Looks Like

  • An inventory of all websites exists, with each application assigned a specific ASVS level, and the list is maintained as sites are added or changed (tools like WatchDog Security's Asset Inventory can help centralize this record).
  • The rationale for each level assignment is formally documented based on data sensitivity and business risk, with clear ownership and review cadence (tools like WatchDog Security's Policy Management can support controlled documentation and revision history).
  • Development pipelines and procurement processes mandate adherence to the defined ASVS level.

The OWASP Application Security Verification Standard (ASVS) provides a basis for testing web application technical security controls. Organizations use it to establish a standardized level of confidence in the security of their web applications.

Level 1 is for low-risk applications and can largely be verified via automated tools. Level 2 is for applications containing sensitive data and requires manual business logic testing. Level 3 is for critical applications, such as healthcare or financial systems, requiring advanced, in-depth verification.

Evaluate the application's risk profile, data sensitivity, and business criticality. Low-risk informational sites typically align with Level 1, while transactional sites handling sensitive user data require Level 2 or Level 3 verification. To keep decisions consistent, tools like WatchDog Security's Risk Register can link ASVS level selections to documented application risks and treatment plans.

CyberSecure Canada requires organizations to formally define the ASVS level for each of their websites to ensure that appropriate web application security testing and verification are planned and executed.

Yes, CyberSecure Canada requires that the organization defines the target ASVS level for each of their websites to ensure all public-facing assets have a determined security baseline.

Organizations should assess the types of data processed, the application's criticality to business operations, and the potential impact of a data breach. High volumes of sensitive data automatically warrant higher ASVS levels.

The chosen levels can be documented within the organization's asset inventory, a secure development policy, or a dedicated OWASP ASVS level definition document mapped to each web property. Tools like WatchDog Security's Compliance Center can also map the documented ASVS level to this control and track assessment readiness alongside supporting evidence.

Organizations should retain documentation of the defined levels, alongside security testing reports, penetration test results, and development checklists that verify the application meets the specific ASVS controls. Tools like WatchDog Security's Vulnerability Management can aggregate findings and remediation status over time, making it easier to demonstrate ongoing alignment to the defined ASVS level.

Automated scanning is generally sufficient for verifying ASVS Level 1 controls. However, Levels 2 and 3 require manual penetration testing and code reviews to validate complex business logic and access controls.

The ASVS level should be reassessed at least annually, or whenever there are significant changes to the application's functionality, the data it handles, or the overall threat landscape.

Keeping ASVS level assignments accurate across many web properties is difficult when inventories are spread across spreadsheets and tickets. Tools like WatchDog Security's Asset Inventory can centralize your website list and record each site's target ASVS level, owner, and next review date so changes don’t get missed.

Auditors typically expect to see the defined ASVS level, the rationale, and proof of testing aligned to that level (e.g., reports, findings, remediation status). Tools like WatchDog Security's Compliance Center can map this control to required evidence and track collection status, while WatchDog Security's Vulnerability Management can consolidate scan and test outputs to support repeatable audit-ready reporting.

CYBERSECURE-CANADA Section 6.3.3.2

"The organization shall define the OWASP ASVS level they need to meet for each of their websites."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication