Steps To Build Risk Based AppSec Program
Steps To Build Risk Based AppSec Program
Welcome!
effectively manage your risk, you need to connect the dots
across the entire SDLC, from Design to Code to Cloud.
Reducing your application security and privacy risk is a and being overwhelmed with alerts will only result in wasted
never-ending process. It involves multiple teams, from time and frustration across your organization.
business to development to security to compliance, working
together to understand and effectively manage risk. We established a simple framework to create and manage
Unfortunately, CISOs often find themselves speaking a a measurable, Risk-Based Application Security Program to
different language than their CIO and VP of Engineering, help organizations improve their program at all stages - for
leading to a lack of innovation and progress. But with a those who are just getting started and for those looking to
common framework, it’s possible to remedy those differences take advantage of the latest best practices and technologies.
and achieve laser-focused alignment across teams. There are no requirements other than an inquisitive nature
and a willingness to challenge current thinking. If you’re ready
There are many strong Application Security Models, such to learn how to gain an understanding of multidimensional
as the Building Security In Maturity Model (BSIMM) and the application risk: read on.
03
Table of
Contents Overview 04 Application Security is Hard!
The Path Forward
Overview
An Application Security or Application Risk Program is not a set of
technologies. It is a collection of people, processes, and AppSec Practitioners are
Overworked & Overwhelmed
technologies that are seamlessly intertwined and work together in
order to reduce risk, lower costs, and deliver faster. For many
years, AppSec programs have focused on vulnerabilities, from
SQL Injection to Cross-Site Scripting (XSS), but a modern
understanding of application and infrastructure security is risk-
based and focused on business impact.
Ask 50 CISOs or Application Security Engineers what an AppSec Application Security Architects are outnumbered by
program should look like and you’ll get 50 different answers. Every Developers by a median ratio of 159 to 1, with each developer
organization has unique needs to define how Security is committing multiple changes a day. To release these
integrated into their Software Development Lifecycle (SDLC), often changes to production, development teams need to go
called the Secure SDLC (SSDLC) or the Secure Development through security and compliance reviews, pen-tests and risk
Lifecycle (SDL). assessments, which are manual, periodic, and inaccurate
because they’re based on self-attestation.
Scale a Risk-Based
AppSec Program Gain Remediate
Define
Risk-Based the Risks
Success
Visability that Matter
Each of these steps builds on the previous to help bring better Automate Approach
understanding and further focus to ultimately help you make Shift Left &
Code the SSDLC
Extend Right
better decisions - more efficiently and even automatically. Governance Holistically
from the beginning and you may find some areas to 6 Steps to Build a Risk-Based Application Security Program
improve incrementally and others to rebuild from scratch.
07
01
Define Success
02
Gain Risk-Based Visibility
Application and Infrastructure code
02
Gain Risk-Based Visibility
Contributors and security champions
02
Illustration 4
Contributors
RECOMMENDATIONS
Create an inventory of your Application code, infra-as-code,
contributors, and more. Ensure that it is updated in real-time
and leverages automation to ensure accuracy.
03
Remediate the Risks that Matter
03
Remediate the Risks that Matter
RECOMMENDATIONS
Build a unified risk remediation work-plan that encompasses
all relevant contextual factors.
04
Automate Code Governance
05
Approach the SSDLC Holistically
Illustration 6
Looking at the SSDLC across
processes and tools
15
05
Approach the SSDLC Holistically
06
Shift Left & Extend Right
While “Shift Left” has been a buzzword for some time in the
developer and security communities, our execution as an
developers ownership over the deployment of their code,
those developers are still hampered by a lack of visibility into
industry hasn’t met expectations. Identifying vulnerabilities relevant information that would help them make better
earlier in the SDLC is an improvement, but a true risk-based, decisions before even sitting in front of a keyboard to write
Shift Left approach will focus on risky material changes before code. The best Shift Left approach is to provide developers
they even become vulnerabilities. It also recognizes that the with the information and training they need to prevent
information across the entire SDLC is relevant to potential risks from becoming vulnerabilities in the first place.
understanding risk in any individual stage, so we need to
extend our data gathering “to the right” to include Security training is another example of how organizations are
Infrastructure as Code. applying a “check the box” mentality - instead of
collaborative and contextual mentality towards security and
True Shift Left Starts with Developer Training compliance. When vulnerabilities are found in code, there is
Continuous feedback is the key to up-leveling the security often after-the-fact training to ensure that developers learn
knowledge of developers by orders of magnitude. In an ideal how to avoid the same error in the future. A better approach
world, all developers would be trained and experienced in would be to understand the developer’s experience, skill set,
secure coding practices from front-end to back-end and be and what they are trying to accomplish in the context of the
skilled in preventing everything from SQL injection to application, from technologies and frameworks used to APIs.
authorization framework exploits. Developers would also have
all the information they need to make security-related
decisions early in the design phase. Once again, reality falls
short of the ideal. While CI/CD automation has given
17
06
Shift Left & Extend Right
Extend Right
While “Shift Left” has received most of the attention, a RECOMMENDATIONS
comprehensive approach to application risk requires you to Build developer training and Security Champion
also “Extend Right”. Consider a developer that is assigned to programs that are contextual and developer-first.
add PII fields to an Internet-facing API. The authorization
controls in the Cloud API Gateway are critical to the security THE BOTTOM LINE
of the new feature! “Shifting Left and Extending right” doesn’t True Shift Left & Extend Right security goes beyond identifying
mean that a scanning tool or Security Architect should detect vulnerabilities, weaknesses, and compliance violations earlier
a security risk earlier in the process - it means that a in the process. It builds on DevOps “first principles” to add
developer should have all the context to prevent the security to the development process seamlessly.
vulnerability before it even occurs.
18
Apiiro is re-inventing the secure development lifecycle for Risk Assessment & Change Management
agile & cloud-native development. Apiiro can help you:
Define Success with risk-based metrics that help you measure
Define Success
your AppSec program at both business & technical levels Application Inventory & Asset Discovery
Gain Risk-Based
Gain Risk-BasedVisibility,
Visibility with a Real-Time Application Inventory
& Asset Discovery
Remediate
Remediate the the Risks
Risks that Matter
Matter, with a risk-based Remediation
Work Plan
Automate
Automate Code Code Governan.
Governance ce with detailed workflows and a
flexible Code Governance Engine
Approach
Approach the the SSDLC
SSDLCHo Holistically with a Risk Dashboard that
covers all SSDLC tools and processes
Shift Left && Extend
Shift Left ExtendRRight
i. g with Security Champion identification Security & Compliance Assurance
Git & CI/CD Security & Integrity SSDLC Processes & Tools Orchestration
19
Illustration 8
Real Time Inventory
Conclusion
To stay relevant, Security professionals need to up-level their on strategic issues and continuous learning. Their role will shift
thinking and messaging to better align with how executives to a quest for knowledge; to understand the latest security
make decisions. The way to do this is to move towards a risk- and compliance concerns, secure coding techniques, and
based Application Security program. By doing this, security defensive practices. They will then spend more time teaching
practitioners can better participate in business discussions developers and disseminating their knowledge than chasing
that come down from the executives and Board - this will vulnerabilities, weaknesses, and compliance violations. That
drive a true digital transformation. knowledge transfer will become an essential part of
DevSecOps and a new avenue of collaboration between
The benefits of this approach will help stakeholders
security and developers.
across the company:
CIOs and CISOs Executives will gain a high-level & contextual Developers Empowering developers by giving them the right
risk into the real risks to the business. They will be able to context and information at the right time is the only way to
speak the same language when discussing security and risk. foundationally change how we do software development. This
is a big change that requires buy-in from multiple areas
Security Architects and AppSec Leaders across the organization, but the ones that do this successfully
A risk-based approach to DevSecOps will fundamentally will be able to release code both faster and more securely -
change the role of Security Architects/AppSec Engineers in and have happier, more-knowledgeable, and better trained
the organization. Instead of chasing, investigating, and software development teams while they do it.
triaging vulnerability scan results, Security Architects can
spend more of their time
21
Conclusion
Penetration testers Receiving contextual alerts related to risky
material code changes will allow Pen Testers to perform
incremental pen-tests on only the changes that matter. They
won’t need to rely on developer surveys or fixed schedules to
know when to perform. In addition, Pen Testers will be able to
focus their efforts better than ever, focusing more time on
risky code areas & ultimately identifying more security issues.
Developing a risk-based Application Security program will change your entire approach to security in software
development. It will help you stop thinking about security as a checkbox function and more of a context-aware
process. You’ll accelerate delivery and finally achieve true Digital Transformation.