App Security .. Still the Achilles Heel !

App Security .. Still the Achilles Heel !

A CISOs world of concern, worry and planning is wide ranging and spans various portions and sections of IT infrastructure and its usage. From securing periphery to changing user habits to ever releasing patches, it is a never ending world of challenges and daily rigors.

Following are some of the key security priorities as they are generally defined and followed in organizations. Mostly in that order.

  1. Security policy formulations and adoptions
  2. Peripheral security technology structure and pieces
  3. Endpoint security and threat protections
  4. Exploits and vulnerability detections
  5. Patching and upgrades for security 
  6. Web infrastructure security
  7. Host and storage security management 
  8. Identity and its life-cycle management
  9. User behavior and internal threat management
  10. Data security for data in motion and data at rest
  11. Application security

In quite a many of my recent discussions and interactions, I discovered that in quite a many organizations, the aspect of security, which is largely neglected and has least security focus or concern is, 'Application'. 'Applications' and 'its security' are still at the tail end of the pecking order of security concern in organizations.

For most of the organization application security still means, conducting regular vulnerability detection and penetration testing, to identify potential issues which might be there. And, then, come up with an action plan to plug the gaps, which are detected by such a test. Even this exercise, is only a cursory routine towards application security, given the fact that most of these vulnerability and pen tests are conducted using standard off the shelf tools available in the market. Most of these vulnerability and pen testing engagements do not have wherewithal of genuine security experts spending time on designing the testing and analyzing the results, and, hence they are mostly rendered an exercise in vain.

If one starts thinking, 'why is this space left largely uncared for or else is left to routine process' by security owners in the organization, following are some of the reasons, which come to mind.

 

  1. Applications are perceived to be behind a layer of security walls, and hence, not that exposed to threats
  2. Application security is something which has to be start at the time of software engineering or software adoption, hence, it has much longer time to realization and recognition
  3. Application security is complex, because it is not driven or monitored by straight observation of communication or transactional flows or events
  4. Most of the application security does not entail the adoption of new technology or new software solution, and hence, is not on the forefront of budgetary planning
  5. Application security is less sexy as compared to some of the other newly coined or adopted trendy security areas such as security analytic of threat intelligence, etc.

 

If one comes to think about applications and their security, or lack thereof, it probably is one of the most critical areas of security operations and management for an organization. An organization can never adopt a proper security posture if it does not adopt thorough and thought through approach to securing its applications all across the board.

One can protect its periphery or hosts or users identities as much as one wants, but, without a mature approach to its application security, one would always be vulnerable to threats and compromises of worst kind !

After all, applications contain the most important assets of the organization, the information about their business.

Though a lot of application security software and solutions options are available in the industry, I came up with following list of key concern areas of application security.

 

Design for it 

Application security is not only about secure coding or protecting application infrastructure. Genuine application security starts with design of application to be secure. Most of the major security issues are introduced in the application software during the design phase. And, security design of application is different than general software design. So, please spend money on hiring a security expert who can help you design security in applications.

Commonality and Standardization of Security Modules

On a proper inspection, one would find that different applications within the same organization, have completely different approaches to security modules of applications, such as authentication module or authorization module. A proper and common architectural and approach framework for security modules of all applications need to be adopted.

Application Firewalls .. They Work !

Quite a many organizations are happy with firewall word being mostly associated with peripheral security. It is difficult to find a proper adoption of application layer firewall in majority of organizations, even today. This is even more true in emerging and developing economies. Adoption of application firewalls after careful consideration of application nature and its sprawl and its access patterns, can really help in maintaining application security.

Logging of Security Events in Applications

Since application logging is designed by functional designer of applications, and, most of the logging in applications is done for debugging or for support provisions, one would find that security related events and entries in application logs are not given the due treatment. Proper security context is not captured in the security specific events in most of the applications in organizations.

Lack of proper information in the logs of application leads to two major issues.

  • Nailing down the security issue when a problem occurs or is detected
  • Lack of security context making it impossible to do proper forensic in the event of an issue
  • Application specific events not being collected by SIEM tools and hence limited of no monitoring of 'application security happenings'

Built-In Security .. In DevOps

The need of code related security concerns and corrections is to be taken care of during the development cycle. Quite a many organization employ the VPAT teams to conduct special suite of test cases on certain critical builds during the release cycle. But, this is not good enough. 

A genuine and complete approach to coding/engineering related security needs to be built into your DevOps practices, process and tool. And, this needs considerable amount of thinking, planning and then resourcing of both tools and skills as part of engineering process establishment.

Monitoring of Application Security 

Since it is difficult to identify, detect, collect and map security events from application logs, majority of organizations completely bypass their application security monitoring. Most of the SIEM or monitoring tools in organizations are picking logs from security devices, security software and identity stores.

Though it is a difficult thing to achieve, but, application security monitoring will provide organization with a better response mechanism, in the event of a security issue occurrence. A security event taking place in application has more possibilities of causing immediate damage or compromise to organization, and hence, its detection and corresponding protection needs to be prioritized. This prioritization is possible only when a proper application security monitoring stance is taken and corresponding solution is adopted.

Building Threat Data Aware Applications

And, if one is keen on adopting advance security postures in organization, one can get into areas of building advance capabilities within security modules of applications. 

Applications security modules, today, can be made aware of and capable of threat data elements. And, application security module themselves can protect the application infra and data from the invalid of threat-ful connection requests and access requests.

The Last .. But .. Not the Least .. Vuln & Pen Testing

The age old, tried and tested approach to subject your web application to routine vuln and pen testing, will never go out of fashion. And, it should not.

Though, adopting a practice of doing vulnerability and pen testing before an application is released in production environment would be ideal. Building a specific sandboxed pre-production environment for such testing would be ideal and would enforce the practice of every application going through a standard vuln and pen testing in pre-production environment before it is released in production environment.

 

In a world where we see web infrastructures and web applications being compromised on a daily basis, organizations need to start thinking of fortifying their most important and critical assets, 'Applications' and 'Data', by adopting a proper and comprehensive approach to 'Application Security'. CISOs need to go way beyond convention models of layered security structures to be able to genuinely protect the real assets, 'Applications'.

 

Leon Kuperman

CTO at CAST AI | Cloud and Kubernetes Automation

8 年

Well written Rajeev Shukla. This post is a great resource !

Another issue with application security is the organizational separation within IT setup of companies. Most of the time, software application owners within companies are structured as a separate group reporting into CIOs. While the security and network unit is a different unit, reporting into CISOs, who in turn report into CIOs. Given that most of the security of applications needs to be driven and done during development and deployment stage, it needs intervention during the software delivery life cycle. Application owners and their groups generally do not carry security expertise and security perspectives, and, hence security concerns get half baked treatment. As a result of this, security team gets an application, deployed in their infra, which is not 'prepared' and 'done' from security point of view. From this point on, it is an uphill battle for security and security ops team to identify the weaknesses in application security, and, try getting those corrected by application groups. This is an extreme example of how organizational boundaries cause damaging implications on security of one of the most important and critical assets of enterprise, 'the applications'.

Ravichandran J V

Associate Director - L & D at SourceFuse

8 年

Quite a nice take, Rajeev Shukla ! DevOps is gaining popularity but not credibility because many large organizations, an online wallet payment facility of a mobile provider or even a nationalized bank's notification via SMS service, still display total amateurish behaviours that are not related to DevOps but demonstrate a fundamental madness in the people that own the processes that are translated into an application flow. So, maybe, beyond DevOps should be a layer of auditing the business process flow of an application, especially if it affects large scale users and/or the essential services of a market, consumer or country before an application reaches the WWW, which may not seem feasible for organizations that are not public. Of course, sand-boxing is a solution but then business decisions are not expected to play the role of super-testers to cover inefficient testers.

要查看或添加评论,请登录

Rajeev Shukla的更多文章

  • Darkweb. Scanning vs Monitoring

    Darkweb. Scanning vs Monitoring

    Dark Web scanning, is being pushed by a lot of people and lot of vendors who either have a background in big data…

  • CISO Role <> Evolution Map

    CISO Role <> Evolution Map

    CISO is one leadership role, which has gone through more changes on competence, skills and maturity curve than any…

    1 条评论
  • Advanced AppSec <> Staying Ahead !

    Advanced AppSec <> Staying Ahead !

    A lot of focus in application security is towards testing software surfaces (web, mobile and API) and ensuring fixes…

  • Management in time of AI and ML

    Management in time of AI and ML

    What Next for YOU ? The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not…

  • Monitor Darkweb / Outside Threats ?

    Monitor Darkweb / Outside Threats ?

    During the last few weeks, one constant question, I had to answer, While demoing and/or discussing one of our portfolio…

    1 条评论
  • Incident Response. Missing?

    Incident Response. Missing?

    Incident Response. Picture of a Failed One ! Recent Wipro fiasco on Breach reported by noted security researcher, Brian…

    1 条评论
  • Security in Super Connected World (IoT Security)

    Security in Super Connected World (IoT Security)

    Introduction to IoT Phenomenon (Internet of Things) Computing and its pervasiveness In the last few decades more and…

    1 条评论
  • Application Security. Logging !

    Application Security. Logging !

    Application Security is critical, when your security perimeter has shifted from usual DMZ and Firewall to web infra and…

    1 条评论
  • Do you feel accomplished, as a leader ?

    Do you feel accomplished, as a leader ?

    When one looks back at his career as a leader what makes him feel happy? When one thinks about your accomplishments…

  • Rogue Apps & Utilities. Threat Unlimited!

    Rogue Apps & Utilities. Threat Unlimited!

    Most of the organizations would claim, they do not have applications running in their environment, which are not…

社区洞察

其他会员也浏览了