Visit HackEDU
Secure Coding Training Application Security

Top 6 Application Security Must Dos with Limited Resources

Stay up to date

The vast majority of application security teams are under resourced. Application security teams should scale with development teams, but this rarely happens. So, given this disadvantage, how can you make your applications safe and be effective with application security?

The only way application security scales with limited resources is shifting responsibility back to developers. Even given infinite resources, developers should ultimately own this security responsibility. Just like with any other bug found in their code, the development teams who are writing the code are also responsible for fixing and maintaining it. The same principles apply when given no resources. Shift responsibility to developers as soon as possible even while waiting for that impossible-to-find application security engineer. The longer you wait, the harder it will be to get your head above water.

How do you shift responsibility back to the developers?

There are four main ways:

  • Develop & Enforce Secure Coding Standards
  • Implement Secure Development Training
  • Develop Security Requirements
  • Deploy and Enforce Usage of Security Tools

And here are two bonus ways:

  • Security Champions
  • Defense in Depth

Develop & Enforce Secure Coding Standards

The first step is to create rules for developers to follow. This helps developers take responsibility for security. Secure coding standards should be developed to be clear what must be done and what must never be done in any given language your teams are using.

For example, in Node, do not use the potentially dangerous functions Eval(), setInterval(), or setTimeout(). There are several free resources for creating Secure Coding Standards including Open Web Application Security Project (OWASP) and US Computer Emergency Readiness Team (CERT).

The Secure Coding Standards should also include:

  1. policies for what open source libraries to use
  2. the process to gain approval for adding libraries to the list
  3. a process for ensuring that those libraries are monitored and updated in a timely manner

Vulnerabilities that live in open source code become public knowledge and attackers use them very soon after they become public.

Putting Secure Coding Standards in writing and distributing them to the team is a great first step. However, without holding the team accountable, it’s unlikely that the standards will ever be fully followed. The standards can be enforced by writing automated tests on all code before being merged with master, using scanning tools like Parasoft, and/or doing manual code reviews. If developers are not held accountable, they will not follow secure coding standards.

Implement Secure Development Training

If you are going to shift the responsibility to developers, you need to give them the resources to be successful. How do you expect a developer to protect against an XML External Entity (XXE) vulnerability if they don’t even know what it is? Arm developers with the tools they need to be able to stop vulnerabilities at the earliest stage in the Software Development Lifecycle (SDLC).

Ensure the training is hands-on and engaging so it can be as effective as possible. Developers generally do not want to be forced to take training, but if the training is interesting and leverages their problem-solving skills it will be more effective. The most effective training has developers actually write secure code, not just learn about it. HackEDU is one hands-on platform that has developers write code to learn secure development.

Develop Security Requirements

If there is no time dedicated to thinking about security, no one will think about it. So, as part of the planning process for any new feature there should be a time set aside to discuss and develop the security requirements. Without thinking through the use cases and abuse cases and how to stop them, functionality will be built without security in mind. This can cause large gaps and make things difficult and expensive to fix later. Some areas to focus on include authentication, access controls, and encryption. All of these have implementation requirements that need to be considered and can be tricky to get the security correct without planning.

When you are developing security requirements, be sure to consider confidentiality, integrity, and availability for all data and systems. Both National Institute of Standards and Technology (NIST) and US-CERT have guidelines for how to develop security requirements.

Deploy and Enforce Usage of Security Tools

Deploy tools that help find vulnerabilities. Both static and dynamic analysis tools should be run to find vulnerabilities. These automated tools will add minimal overhead to run. There are many tools that can be used such as Parasoft. These tools should always be run before merging code to master and pushing to production.

Developers should be required to triage the issues themselves before merging code, as this helps developers take responsibility for their code. Running dynamic and static tools early and often in the development process helps keep costs low by keeping the work with the developer who is most familiar with the code. In order to enforce usage of the tools, they should be integrated into the Continuous Integration/Continuous Deployment (CI/CD) process. Putting technical controls in place to enforce usage will help ensure compliance.

Bonus: Security Champions

Some companies have had success making one or two developers on each team "Security Champions". This works best if it is voluntary rather than forcing people to be a part of it, as a lot of times there are developers who are already excited about security. Being a Security Champion means these developers will take on additional responsibility. They are the ones who think about security, ensure that the Standards are up to date and enforced, research new security requirements that may be needed, and evaluate security tools.

Security Champions are the developers who will think about security when others do not. The success of security champions depends on the size of the team and the culture of the company. It is not worth forcing a security champions program if it will not work in your organization. If you force it then it could have negative effects such as security functions or requirements falling through the cracks.

Smaller companies earlier in their life cycles typically have more success with Security Champions because there is less of a culture change. Having a Security Champion from the start will make it easier to scale as the team grows. Most organizations have developers that would be interested in doing this, so it is worth exploring.

Bonus: Defense in Depth

There are other things that should be done around the Secure Software Development Lifecycle that can help reduce the risk of vulnerabilities in your applications and do not require significant resources. Additional security controls include adding logging, setting up a Web Application Firewall (WAF) or Runtime Application Self-Protection (RASP), isolating environments (development/production and critical data/non-critical data), as well as monitoring for unusual behavior. With limited resources, adding additional risk reduction without adding people is important. WAF and RASPs can be expensive, but these can be implemented without application security engineers.

Conclusion

Shifting responsibility to developers is the only way to "win" with limited resources and developers should ultimately be responsible since it is their code. The best place to start is ensuring that you develop and enforce Secure Coding Standards, implement Secure Development Training, develop Security Requirements, and deploy and enforce usage of Security Tools. You might also want to look into having Security Champions as well as adding Defense in Depth.

The earlier you can shift the responsibility to developers, the more scalable your application security program will become. Everyone hates change, especially developers, so shift responsibility early so that fewer folks need to change in the future.

In addition, get buy in from engineering. Until you get buy in from the CTO the battle has just begun, sometimes even if the mandate comes from the CEO. In reality, putting in place these minimal technologies and processes will help speed up development with fewer vulnerabilities to fix later in the SDLC where it is more expensive and time consuming. If developers won’t take responsibility for the security of their code, it shows a lack of ownership and you can expect production code to be more like R&D code with many non-security bugs as well.

Stay up to date