How to Improve Your Application Security PracticesAdded 4th Dec 2012
Organizations talk a good game when it comes to security, but many still focus the majority of their security resources on the network rather than their applications—the vector for most data breaches. Many organizations dedicate less than 10 percent of their IT security budget to application security, according to a study by research firm the Ponemon Institute, released earlier this year.
The reasons for this gap are multifaceted, says Jeremiah Grossman, founder and CTO of WhiteHat Security, provider of a continuous vulnerability assessment and management service for thousands of websites, including the websites of dozens of Fortune 500 companies. First, he says, many security professionals have a blind spot for software.
“Most of the security guys out there are not software people,” he says. “They come from an IT background. All they really know how to do is protect the network.”
Second, regulatory compliance and the cruft that comes with regulations based on past threats also play a role in Grossman’s view.
“Organizations must comply,” he says. “They spend the lion’s share of their budget first on firewalls and antivirus because the compliance regulators mandate it.”
Prioritizing App Security: A Challenge
It is often difficult for the organization to prioritize application security over revenue-generating development work, he says. Even when organizations identify serious vulnerabilities in their websites, it’s not necessarily a simple decision to fix them.
“The organization has to fix it themselves,” he says. “The business has to decide: ‘Do we create revenue-generating features this week? If we don’t deliver those features on time or at all, we will for a fact lose money. Not fixing the vulnerability may potentially cost the business money.’ They have to make a decision.”
Application Vulnerabilities on the Decline
Even with these challenges, Grossman says the application security landscape shows signs of improvement. While 2011 was dubbed the Year of the Breach-based on a multitude of high-profile breaches of companies like RSA, Sony, Facebook and Citigroup, not to mention the CIA and FBI—2011 was also a year in which the average number of serious vulnerabilities in websites showed a marked decline.
For 12 years, WhiteHat has put together its WhiteHat Security Website Security Statistics Report based on the vulnerabilities it finds in the websites it assesses. The 2011 installment, based on the examination of critical vulnerabilities from 7,000 websites across major vertical markets, found an average of 79 serious vulnerabilities per website, a drastic reduction from the average of 230 it found in 2010 and 1,111 it found in 2007.
“These are real-world websites,” Grossman says. “I would guarantee that you have accounts and data in many of the sites we test.”
Of course, that single statistic doesn’t tell the whole story. While the average came in at 79 serious vulnerabilities, the standard deviation was 670: Some websites expose a lot more vulnerabilities than others. Also, according to Netcraft, there are roughly 700 million websites on the Internet and tens of millions more are coming online each month. While it’s a large sample, 7,000 websites is just a tiny fraction of the whole.
Still, WhiteHat’s findings paint a picture of the state of website security today; a picture in which website security is slowly improving. The banking vertical continued to show its dedication to security: Banking websites again possessed the fewest serious vulnerabilities of any industry with an average of 17 serious vulnerabilities per website. Banking also had the highest remediation rate of any industry at 74 percent. Every industry, with the notable exceptions of healthcare and insurance, showed improvement from 2010.
Additionally, time-to-fix showed vast improvement, dropping to an average of 38 days-much shorter than the average of 116 days in 2010. “The developers know that 38 days is actually a really, really good number because they know how long it does take,” Grossman says. “But to the end users, 38 days is unacceptable.”
Improve Your Security Posture
To improve your application security posture and make the best possible use of your IT security budget, Grossman suggests you first determine whether you are a target of opportunity or a target of choice. Targets of opportunity are breached when their security posture is weaker than the average organization in their industry. Targets of choice possess some type of unique and valuable information, or perhaps a reputation or brand that is particularly attractive to a motivated attacker.
“On the Web, if you’re doing business of any kind, you’re going to be a target of opportunity,” Grossman says. “Everybody has something worth stealing to a bad guy these days. Other companies are a target of choice because they have something the bad guys want: Your credit card numbers or IP or customer lists. This aligns with how secure you need to be. No one needs perfect security.”
If you determine you’re a target of opportunity, Grossman says, you need to make sure that you are a little bit more secure than the average business in your category. He notes organizations can use the data in its WhiteHat Security Website Security Statistics Report to benchmark where they need to be.
Targets of choice, on the other hand, need to make themselves as secure as they possibly can and then prepare plans for how to react when they are breached so they can minimize the damage as much as possible.
Grossman also recommends that organizations hack themselves in an effort to understand how attackers will approach their websites. Additionally, he says organizations need to understand their benchmarks: Which vulnerabilities are most prevalent in their websites, what’s their time-to-fix, their remediation percentage, average window of exposure, etcetera.
If you consistently see vulnerabilities of a particular type, like cross-site scripting or SQL injection, it’s a sign that your developers need education in that issue or your development framework may not be up to snuff. If your time-to-fix is particularly slow, it’s a good bet that you have a procedural issue—your developers aren’t treating vulnerabilities as bugs. If you consistently see vulnerabilities reopening, it suggests you have a problem with your ‘hot-fix’ process—high-severity vulnerabilities get fixed quickly but the change is back-ported to development and a future software release overwrites the patch.
“Understand your software development cycle,” Grossman says. “Understand where you’re good, where you’re bad and make your adjustments accordingly.”
Robosoft Technologies, an Indian IT company founded in 1996 has been able to stay relevant for the last two decades because they continued to reinvent themselves constantly.
According to the State of the CIO 2015 Survey, a majority of CIOs who are considered competitive differentiators by businesses are more satisfied than those who are considered cost centers. But that’s just one of the many differences between the two.
Building a flexible, agile, and dynamic platform keeps Palo Alto Networks ahead in the fiercely competitive security market.
CIOs share their views on cyber security risks and the various strategies that can be applied to mitigate the threat.
Vadodara-based Indusface aspires to be a global market leader in the application security space with its integrated "Total Application Security” solution.
All CIOs should know where their company assets are located, says Greg Bryett, Sales Director, APAC and LAM, RF Code.
New technologies have forced organizations to rethink their security strategy. Three Indian CIOs debate the best way forward.
Intellinet Datasys creates a mobile application that allows the field staff, site engineer, and supervisor to solve customers’ problems faster.
By digitizing employee documents, Mindtree has successfully reduced its time to access information and increase customer satisfaction.
CIOs from some of India’s biggest organizations came together to exchange ideas and insights about the changing realities in the application landscape and how to cope with them.
New and sophisticated threats are giving organizations sleepless nights. But Scott Robertson, VP, Asia Pacific and Japan, WatchGuard Technologies, says that the company is at the forefront of innovative technology and is the perfect alibi for CIOs.
The modern day business environment is flipping the traditional BI model upside down, says Christof Majer, Vice President, Global Partner Sales, Qlik.
An in-depth conversation with Bill Hilf, Senior Vice President of Product and Service Management for HP Cloud, about where Helion fits in, cloud consumption models and coming change.
Mobility is taking business productivity and customer experience to new highs. That’s what a roundtable in Chennai, held in association with Airtel and the CIO magazine, uncovered.
Mobility is transforming businesses and changing how organizations work. CIOs from some of India’s most prestigious organizations gathered in Hyderabad to discuss how mobility is changing business realities.