DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. RASP and Security Against Internal Breaches

RASP and Security Against Internal Breaches

While the Verizon 2016 Data Breach Investigations Report confirms that the most significant threats to a company is from external actors, it remains critical to protect your assets from internal threats as well.

Mike Milner user avatar by
Mike Milner
·
Jan. 02, 17 · Opinion
Like (1)
Save
Tweet
Share
1.93K Views

Join the DZone community and get the full member experience.

Join For Free

As companies consider their application security posture, it is critical to remember that breaches can come from both outside and inside the company and its trust boundaries. Internal threats require just as much protection as external risks.

While the Verizon 2016 Data Breach Investigations Report confirms that the most significant threats to a company is from external actors (roughly 80% in 2015), it remains critical to protect your assets from internal threats as well. Insiders and those with privileged access (such as supply chain partners) have unique admission into your system—they may purposely attack the system or collude with an outside attacker to do so, or they may accidentally provide access without any ill intentions.

One big challenge for protecting against internal threats is that an internal attacker likely has a higher level of understanding of the application they are attacking. Because the reality is that when an attack comes from inside, it may come from a developer. This insidious threat may even be because a developer purposefully left a vulnerability in the application with the plan of later exploitation.

Protection From the Inside

Runtime application self-protection (RASP) is one of the best technologies to protect your applications from all threats, even from the inside. That is because it is easy to deploy across all your applications, internal and external, and it provides all the applications the same high level of protection.

Web application firewalls, for example, are limited in their ability to protect against internal threats. They are cumbersome and expensive to deploy, which means that often companies only use them to protect really high value assets, leaving others vulnerable.

Static analysis is also cumbersome and has the added challenge, in this case, of requiring input from a developer to be truly effective. Static analysis may identify the bugs in the system, but it still requires a developer to fix them.

RASP technology protects the whole system, from threats internal and external, without active developer involvement. It also protects any vulnerabilities it discovers until they can be fixed, no matter how long that may take.

There are applications within your organization available only to insiders, employees or partners on your internal network. Historically companies have not spent much time thinking about the need to protect themselves from these players. Companies that include insider threats in a complete risk profile realize the need to protect their web applications from all angles. RASP provides that protection without extra work and without casting any of your employees or partners as potential attackers.

Application security Web application

Published at DZone with permission of Mike Milner, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Event Driven 2.0
  • Top 10 Best Practices for Web Application Testing
  • A Beginner's Guide to Infrastructure as Code
  • A First Look at Neon

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: