Forrester’s State of Application Security, 2020: Key Takeaways

In The State of Application Security, 2020, Forrester predicts application vulnerabilities will continue to be the most common external attack method. Because of this, organizations are urged to continue testing early in the software development life cycle (SDLC), implementing auto-remediation for security vulnerabilities, and shoring up production protections. To learn more, we’ve put together an overview of Forrester’s report to provide you with the key takeaways for application security.

Applications Continue to Be the Weakest Link

As applications become more complex, rely on third-party libraries, and support new frameworks, they become more vulnerable to security threats. In a survey of security professionals, the majority of external attacks were carried out either by exploiting a software vulnerability (42%) or through a web application (35%). 

Forrester cited open source software as a chief concern for application security. Although open source software allows development teams to code faster while focusing on their own core expertise, it remains as vulnerable as it is pervasive. In fact, open source security vulnerabilities have risen by 50% since last year. 

The rise of new architectures and frameworks also creates risk as they provide new attack surfaces. Security professionals must now worry about things like unsecured APIs, image integrity, and changes to containers and functions in production.

No doubt developers are moving faster than ever before. More than one-third of developers are releasing new features or updates on a monthly basis or faster. Security must keep up. Any security tools and processes that don’t will be left behind.

More Security Is Needed Throughout the SDLC

Despite the risk posed by applications, only 14% of organizations fully integrate security throughout their SDLC. For organizations just beginning to address security in the SDLC, most are implementing security at the testing stage. In order to protect their applications, organizations are encouraged to shift left to earlier development and design stages when it comes to security. 

Despite this grim news that not enough organizations are fully integrating security into their SDLC, Forrester does see several encouraging trends. First is the rise in popularity of interactive application security testing (IAST) at the expense of dynamic application security testing (DAST) tools. Moving to IAST helps teams embed security into their existing development processes more effectively than DAST. 

Second, software composition analysis (SCA) tools, which automate visibility into open source inventory to assess security risk and license compliance, are being implemented in development phases at about the same rate as they are being implemented during testing. This signals a trend toward shifting left. Organizations will benefit from implementing SCA earlier in development to help prioritize and remediate open source vulnerabilities. 

Finally, container security is shifting to earlier development stages too. According to Forrester data, in the coming year, 37% of security professionals plan to implement container security during development, and 20% plan to implement it during design.

Embrace Automation

Forrester strongly recommends organizations embrace automation in testing and remediation, which reduces vulnerabilities overall while also educating developers in real time. By integrating automated application security testing tools into the CI/CD pipeline, scans can be run continuously on check-in, build, and integration to make remediation quick and cost-effective. Auto-remediation will also help scale your development and security resources by reducing time-to-fix.

Don’t Get Complacent

Because of the security risk posed by applications, it is important to invest in security that aligns closely with the development process. Forrester outlines several ways in which to accomplish this:

  • Ensure your security policies cover open source and container images, and use SCA and container security tools.

  • Developer security champions should be used to extend security’s reach and train developers throughout your organization.

  • Software development policies and training must support auto-remediation tools.

By following the path of seasoned security professionals, you can mitigate your organization’s risk. Now is not the time to backslide on application security.

*** This is a Security Bloggers Network syndicated blog from Blog – WhiteSource authored by Patricia Johnson. Read the original post at: https://resources.whitesourcesoftware.com/blog-whitesource/forresters-state-of-application-security-2020

Recent Posts

Baby ASO: A Minimal Viable Transformation for Your SOC

Vaguely relevant but very cyber image from Dall-EOne pattern I spotted after looking at the evolution of IT and security organizations…

6 hours ago

LabHost Phishing Platform is Latest Target of International Law Agencies

The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement agencies from both sides of the Atlantic…

9 hours ago

Choosing SOC Tools? Read This First [2024 Guide]

Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of…

9 hours ago

USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

Authors/Presenters: *Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez* Many thanks to USENIX for publishing their outstanding USENIX Security…

10 hours ago

SafeBreach Coverage for AA24-109A (Akira Ransomware)

FBI, CISA, EC3, and NCSC-NL issued an urgent advisory highlighting the use of new TTPs and IOCs by the Akira…

10 hours ago

Taking Time to Understand NIS2 Reporting Requirements

The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023.…

11 hours ago