Application Security: Methods and Best Practices
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
Application security is arguably the single biggest challenge confronting security professionals today.
By “application,” I mean any internally-developed build, regardless of whether its primary intended platform is the Web, mobile devices, or a traditional desktop OS like Windows. This is because all application builds must go through the standard cycle of development, testing, settling on a release candidate, and deployment into operations — at which time, too often, problems are found and the new build is sent back for fixes. So application security can often be improved by trying to improve on that cycle, at various points.
Application Security for COTS (commercial-off-the-shelf) applications is inherently more limited, of course, and a topic for another post, though the section “How IT operations teams can improve application security” below is a good place to start.
This perspective has led to DevOps initiatives (a combination of Development and Operations), which try to overcome traditional problems including:
A more agile build cycle unfortunately also sometimes means new application security problems. So, toward improving that situation, there are many measures app stakeholders can and should adopt.
First, from a development standpoint, it’s important to integrate application security best practices in coding regardless of the specific methodology (Waterfall, Agile, etc.). After half a century of careful analysis, we now know quite a bit about how programming errors tend to arise, and how best to avoid them.
For instance, consider the SANS list of Top Twenty-Five Most Dangerous Programming Errors. This is a ranked list based on expected business impact, complete with prevention/remediation techniques in every case. Every developer should have it bookmarked — or even better, memorized as their starting point for application security.
There are, additionally, various code vulnerability scanners designed specifically to improve application security at this early stage. I’ve gone into these in another recent blog entry, so won’t be exploring them in detail here, but they can help automatically spot cases in which best practices have not in fact been followed in coding.
Much of the newer insight concerns DevOps per se. As these two domains become more and more tightly integrated, all sorts of great new opportunities arise to drive up application security as a result. Four instances follow:
Finally, we come to the operations side — where builds will live and breathe in production servers, creating business value in real time.
This is a complex area, but I would say that any shortlist of best operations application security practices these days should include:
We live at an interesting time, when the very definition of applications is rapidly changing — consider all the apps recently introduced for mobile devices, Web apps, plus composite apps! So are the diversity and complexity of the environments in which they operate.
The key to application security therefore appears to be handling all this complexity through a unified approach. More and more, I’m seeing devices like NGFWs include a broad feature set. I’m also seeing “security fabrics” developed that allow third-party offerings to integrate in newer, better ways. This means that — hopefully at least — security professionals should be able in future to manage security more from a holistic standpoint, and less in different domains, via different solutions and processes.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.