Abstract
The article discusses requirements for protected web-based applications and measures to ensure the availability, confidentiality and integrity of data being processed and stored. The most dangerous threats of web applications according
to OWASP are analyzed. The most optimal and necessary measures and requirements for ensuring security of web applications were selected.