Over a million developers have joined DZone.

Thoughts on Modern Security Practices and Security Frameworks

DZone 's Guide to

Thoughts on Modern Security Practices and Security Frameworks

With the explosion of cloud, web apps, and mobile devices, the attack surface for hackers has grown exponentially, thus using a proper sec framework is business critical.

· Security Zone ·
Free Resource

How have modern assets like cloud instances, web-based applications, mobile devices, application containers, and others affected your security and risk management program?

It's way past time for organizations to realize how ridiculous it is to not expect web applications and APIs to be attacked. There is no perimeter, and there are no "internal" applications. Application security isn't optional, it's the leading cause of breaches.

The explosion of libraries and frameworks, APIs, containers, CI/CD, and other modern development practices have left traditional AppSec practices and tools in the dust. Organizations should continuously inventory, assess, and protect every application and API in their portfolio.

What are the business benefits and security benefits of adopting a security framework?

Cybersecurity is insanely complicated.

People often compare it to securing houses or cars. But, these analogies massively underestimate the challenge(s). For most organizations, a better analogy is securing an entire city. Think legislature, locks and guards, alarms, fire department, and social services. Adopting and customizing a cybersecurity framework is critical to achieving a balanced program, and can help with identifying gaps, budgeting, executives, etc. But remember, adopting a framework doesn't secure anything - it just helps you get organized.

As you build-out your framework and incorporate modern security practices, be sure to check out some useful tips in our Continuous Application Security Handbook (CAS). It makes recommendations on how to build a unified program covering the entire software lifecycle.

security tools ,security ,cloud security ,web application security

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}