build secure applications with software analysis

14

Upload: cast

Post on 22-May-2015

202 views

Category:

Technology


2 download

DESCRIPTION

Learn how advanced Software Analysis and Measurement (SAM) can help improve application security by analyzing source code to identify vulnerabilities and architectural patterns in the application, and enable development teams to prevent these vulnerabilities right at the development stage with sophisticated Threat Modeling that takes into account cross-tier and cross-technology interactions. To read the full paper, visit http://www.castsoftware.com/news-events/event/build-secure-applications-with-software-analysis?gad=ss

TRANSCRIPT

Page 1: Build Secure Applications with Software Analysis
Page 2: Build Secure Applications with Software Analysis

Despite the fact that application

security has become an

increasingly major concern in

recent years, many application

development teams treat security

as an afterthought.

Page 3: Build Secure Applications with Software Analysis

The answer is

Software Analysis and

Measurement (SAM).

Page 4: Build Secure Applications with Software Analysis
Page 5: Build Secure Applications with Software Analysis

While each individual

organization has different

needs, there are few

important criteria that you

need to know when managing

application security.

Page 6: Build Secure Applications with Software Analysis

Since design flaws account for 50% of all

security problems, a holistic view of the

application is necessary to identify

architectural vulnerabilities.

Page 7: Build Secure Applications with Software Analysis

To evaluate against industry best practices, the

data flow technology must be able to trace the

flow of the application data across different

tiers of the application and across different

technology stacks, right down to the database.

Page 8: Build Secure Applications with Software Analysis

Many SAM solutions produce lists of violations

that number in the hundreds, if not thousands.

It important to also receive guidance that can

be used to prioritize these security risks based

on factors such as the importance of the rule,

the impact across a transaction chain, and the

propagation risk across the rest of the system.

Page 9: Build Secure Applications with Software Analysis

Virtually all applications in active development

have a framework component to them. To be

effective, the SAM solution must be capable of

analyzing the framework stack of the

application and synthesizing the information in

the context of the overall application.

Page 10: Build Secure Applications with Software Analysis

Building a Threat Model is one of the most

critical measures for all mission critical

applications, and should be considered for

virtually your entire application portfolio. To

build comprehensive Threat Models, it is vital

to have an accurate blueprint of the

application that maps all of the inputs and

outputs.

Page 11: Build Secure Applications with Software Analysis

There is a vast body of knowledge, discussion,

and research on making applications inherently

more secure. One of the fundamental

requirements of a SAM solution is to ensure

that the application is compliant with the best

practices recommended by experts and

practitioners.

Page 12: Build Secure Applications with Software Analysis

To be truly beneficial to the development

team, a SAM solution should not only identify

vulnerabilities in applications—it also should

ensure continuous improvement through

detailed explanations of identified

vulnerabilities along with the solution to fix it.

Page 13: Build Secure Applications with Software Analysis

Executives require a comprehensive analysis of

security vulnerabilities that can be used to

determine the security risks within an

application portfolio. Having such a tool will

help with budget requests, project portfolio

management, resource prioritization, and

benchmarking internal and vendor teams.

Page 14: Build Secure Applications with Software Analysis

SAM solutions:

Automate feedback to developers providing proactive protection and real-time education

Enforce compliance to industry standards and best practices

Help in complex Threat Modeling and enable management teams to assess application threat in an objective manner and help them make informed decisions

To view the complete paper, click the link in the description below.