How to Effectively Assess the Security of Your Applications
Sekurno | Cybersecurity
Sekurno is a leading cybersecurity firm dedicated to providing robust security solutions that go beyond compliance.
Introduction
Why would you want to know the current state of application security in your organization?
There may be several reasons:
Although there are various cybersecurity frameworks dedicated to this purpose: OWASP SAMM [1][3], BSIMM [2][3], NIST SSDF [2], they are difficult to start with and often too general to follow. For example, NIST SSDF [5] states:
The SSDF does not prescribe how to implement each practice. The focus is on the outcomes of the practices rather than on the tools, techniques, and mechanisms to do so. This means that the SSDF can be used by organizations in any sector or community, regardless of size or cybersecurity sophistication.
This leaves companies to define their own approach to these frameworks, which is where many organizations struggle.
Step 1: Know Your Applications and Infrastructure
The first step is to understand the full scope of your applications and infrastructure. If you don’t know what you’re protecting, it’s impossible to create a solid security plan.
Start by creating an asset inventory that describes all the applications and infrastructure assets your organization uses. While you can purchase automated asset discovery tools, it’s also possible to do this manually with a template like this:
Key Considerations:
?? Tip:?Work with your DevOps team and application product owners to fill out this asset inventory. Start small—don’t worry if some information is missing initially; you can always return to it later.
Step 2: Application and SDLC review
Many application security programs are created by someone new to the organization or security, often without full knowledge of the software development process. Especially in larger organizations, understanding the SDLC across different teams can be a challenge.
SDLC review
If your organization has a consistent SDLC across all teams, great! You can review security practices by meeting with a product owner or DevOps lead. Otherwise, you’ll need to hold additional meetings to understand the different processes in play.
Here is an example of a template to use during interviews:
Prepare a list of questions to ask during the meeting, and assess how security is integrated throughout the development process.
Focus Areas:
Application functionality review
To evaluate the business risks associated with your applications, conduct demo sessions with team members who understand the application context—usually product owners or QAs.
Prioritize public-facing apps or those handling sensitive data. Aim for 1-2 hour sessions per app and review the following:
This will help you understand which apps carry the most risk and should be prioritized for security reviews.
?? Tip: Don't forget to record meetings with team members and save audit documents in the project folder. Chances are you will need to review them later.
Step 3: Infrastructure Testing
Now that you’ve inventoried your applications and infrastructure, it’s time to assess their security posture.
领英推荐
Infrastructure Vulnerability Assessment
Perform vulnerability assessments (VA) [6] on all assets in your inventory, focusing first on public-facing resources (external infrastructure) and later on internal assets.
Use tools like Nessus [6] (for infrastructure), Acunetix [7] (for web-based scanning) or OpenVAS [8] (open-source scanner).
?? Tip: Always validate scanner findings to filter out false positives and focus on the high-risk vulnerabilities. Categorize them by severity and impact.
Prioritization:
Use this prioritized approach to set clear security objectives and decide what needs to be addressed first.
Step 4: Application Security Testing
Once your infrastructure is assessed, turn your attention to the applications.
Full-Scale Security Audit
For critical applications, conduct a full-scale security audit following the OWASP ASVS [9] or Mobile Application Security Verification Standard (MASVS) [10] checklists.
These audits will require access to source code, documentation, and test environments. Typically, an audit for a critical application takes about two weeks, depending on its complexity.
Ad-Hoc Manual and Automated Testing
For less critical applications, a timeboxed approach to security testing can be more efficient:
For instance:
??Tip: Document findings and update the asset inventory with the results to keep everything centralized and easy to review.
Now that you know what's going on with your apps and infrastructure, we can start putting together our first set of security goals and get to work on implementing the right security practices and controls.
Summary
It's really important to understand where your organisation is with application security right now. This is true whether you're introducing security into your SDLC or doing a risk assessment. While frameworks like OWASP SAMM, BSIMM, and NIST SSDF give some helpful guidance, their general nature often leaves companies struggling with implementation.
The first thing you need to do is create a complete list of all your assets, which is the basis of your security strategy. The best way to make sure you know what you're protecting is to work with your DevOps and product owners to document all your assets.
Then, you want to review your SDLC for security integration and evaluate your application functionality. This helps you identify security gaps early in development. Finally, test your infrastructure and applications via vulnerability assessments and security audits. This will give you a clearer picture of your security posture.
References
About the Author
Alex Rozn is the Co-founder and CTO/COO of Sekurno, a cybersecurity company focused on securing applications and infrastructure through solutions that go beyond compliance. Follow Alex for insights into application security, DevSecOps integration, and cutting-edge cyber protection strategies.