Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Value Delivered by Application Security

DZone's Guide to

Value Delivered by Application Security

Peace of mind - if they're doing application security, and testing, correctly.

· Performance Zone
Free Resource

Evolve your approach to Application Performance Monitoring by adopting five best practices that are outlined and explored in this e-book, brought to you in partnership with BMC.

We asked 19 executives who are involved with application security where they say the greatest value is being added.

Here's who we talked to:

Here's what they had to say when asked "Where is the greatest value being seen with application security?":

  • Ensuring no knowledge is lost. If an app is hacked, it’s not a big deal if no knowledge is lost. Zero knowledge doesn’t have the ability to decrypt or see customer data. Data can’t be leaked. If used correctly the hacker gets a big blob of nothing. Write like you think you’re going to be hacked. Think about, and be aware of, what you transmit from the application to the server. Don’t transmit any unnecessary information. Encrypt all information. Encrypt and decrypt on the device level to negate the “man in the middle” sniffing data. Being hacked is process control - antivirus, firewall and security. If you’re hacked, what’s your exposure?

  • Still basic human education. No tools or processes have sufficiently matured. A sophisticated attacker is not using $100,000 tool to attack. They’re being creative. Don’t buy tools, improve education from different angles.

  • Detection and transfer of knowledge. Coder or InfoSec team needs to translate to the developer and advise them on how to address security issues. Transfer of domain knowledge is critical to securing web applications.

  • Companies that develop and use software to analyze source code with static and dynamic code analysis. All of the programs looking for vulnerabilities have too many false positives. Not possible to find all the vulnerabilities in the source code.

  • Preventing malicious hacks. In an ideal world, applications would always be coded securely, pass all vulnerability scans and penetration tests, and never encounter zero-day attacks. There is no such thing as invulnerable code.

  • The entire security industry makes customers and organizations more secure while also enabling customers to do more. While trying to make things more secure they are also trying to provide a good end user experience - more seamless, connect more seamlessly. It is unacceptable for antivirus software to slow your computer down. Likewise it is unacceptable for the security solution to slow down the performance of an app.

  • Web and mobile are the same - it’s all web traffic. The app must be secure regardless of where it resides. Default server with encrypted data - email and credit card is all encrypted and kept in separate databases. All a case of process: encrypt, separate databases. It comes down to design. If you develop ad hoc you have to test and come up with patches for the new hole that you just created in your ad hoc development. Mindset is to have a process. Identify who your customer is - who do you want to have access. Weed people out who aren’t your customers you weed out people doing bad things.

  • Privacy is huge for business. All data is sensitive. Provide peace of mind.

  • Starting to become more visible. The greatest value is providing real risk mitigation. AppSec bring visibility beyond just the technically focused. Identify the risk posture so it can be understood by IT executives.

  • Purpose-built solutions are the only ones providing value at this point. They are solving a specific problem. Others are so broad and general they’re not solving the problem.

  • The brand - the Starbucks mobile hack received a lot of press as did Evernote’s change in their privacy policy. The more secure you make it, the more secure your brand. Cost-savings by doing it right the first time rather than having to go back and forth with security.

  • Core value for application security is not the incurred cost from poor security as much as it’s dealing with the consequences, reputational, costs senior executive jobs, and worse (e.g. Ashley Madison executive committing suicide).

  • VPN service provides holistic protection. When you go to a public wi-fi with no SSO protection it’s easy to have your data stolen. When you use a VPN your data is protected - it goes back to education. We work with Movements.org, a crowdsourcing human rights platform to enable people in politically unstable countries to download free cybersecurity software that enables users to circumvent censorship and surveillance.

  • Organizations are making use of cloud services - their own or third party - which is tied to company financials and corporate purchasing. This adds an extra dimension to the importance of app security. The consumption of other cloud services (e.g. storage, SalesForce, WorkDay) means they all have to be secure. AWS has API web keys that have to be secured. AWS has done a good job of having a more sophisticated model around API security and ensuring that their clients have protected keys to access their services. If you let your keys get into the wrong hands, there are very bad consequences. AWS has increased cloud access security awareness and education. Their model includes signatures and timestamps.

  • How do you calculate the value of not being attacked? Not having to tell your clients, or the media, that you’ve had a data breach. An ounce of prevention is worth a pound of cure.

  • Peace of mind, especially with ScenGen - tested everything and had hackers try to hack.

  • For enterprises, virtualization is starting to pay off because they can enforce encryption and security to virtual desktops and folks who BYOD. Consumer is a mixed bag. Financial services companies are coming out with apps to meet consumer demand but that’s leading to more fake banking apps and consumers unable to tell what’s fake and what isn’t. Big companies are getting more nimble, but this is also inviting more “bad actors.”

  • Mobile platforms since apps on the front end provide a door to the backend. IoT and medical devices, telematics in automotive. Security, innovation and automation should all go hand-in-hand.

Where are you seeing the greatest value with application security?

Does it differ from the areas shared above? How?

Learn tips and best practices for optimizing your capacity management strategy with the Market Guide for Capacity Management, brought to you in partnership with BMC.

Topics:
application security ,mobile ,vpn ,authentication

Opinions expressed by DZone contributors are their own.

The best of DZone straight to your inbox.

SEE AN EXAMPLE
Please provide a valid email address.

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.
Subscribe

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}