What is Application Security?

Let’s not waste your time: Application Security is Continuous Delivery. You get there by shipping code rapidly, shortening the feedback loop, embracing change, experimenting, and learning.

Modern Application Security in 15 minutes

The fastest way to share what I know about AppSec with you would be to recommend watching at least the first 15 minutes of this excellent speech by Dave Farley. He explains everything there is to know about modern application security:

Dave Farley also wrote a great new book about faster production of better (and more secure) software. Currently, this is the only modern book about Application Security I can recommend:

Modern Software Engineering

My Personal View on Application Security

Application Security is no longer a separate, standalone profession. I cannot distinguish between security issues and other software bugs in design and code. In my experience, fixing a non-working Application Security program is usually done by acknowledging that and joining the development team’s software defect process (instead of inventing a separate process that requires extra resources)

I think that application security engineers are software engineers. And that if you are a pentester, an "offensive security" professional that never shipped code - you are part of Quality Assurance. You are testing the code for defects just like everybody else. This is how you are adding value.

Definition of a "Secure Application"

Most application security professionals I’ve spoken with could not answer the following question: What does it mean for an application to be secure?

Here’s the best definition I could find so far:

A secure application is an application that only does what it was designed to do and nothing else.

— Someone at the Security Weekly podcast
I apologize for not being able to find the author of this definition

Definition of an Application Security Issue (Vulnerability)

Do let me know if you disagree with this definition:

Security issues are unplanned, undesired, and unexpected application behavior.

See any difference with other software bugs? I don’t.

Sources of Application Security Issues

Application security issues, like any other software bugs, come from what is expected and natural to all humans - exercising our right to make mistakes and not always be perfect at everything.

The most common mistakes that led to the creation of application security issues I witnessed were:

  1. Reinventing the wheel and the resulting unnecessary additional complexity - such as taking on work (and assuming the corresponding responsibility) that is out of the original project (or task) scope.

  2. Making decisions in isolation - in the world of instant communication and the Internet, assuming that you are the first to face this problem and that no one else hasn’t solved it. And in the rare scenario when there is no existing solution, thinking that you already have enough knowledge and resources to solve it without the help of others.

Preventing Application Security Issues

It didn’t take long to realize these two items above ("reinventing the wheel" and "making decisions in isolation") are parts of the same problem:

If I’m doing something myself, I’m probably doing it wrong

After over a decade of watching successful development teams, talking to my friends and experts in the industry, and following the Lean → DevOps → Continuous Delivery movement, it all boils down for me to the Linus' Law:

Given enough eyeballs, all bugs are shallow

— Eric S. Raymond
The Cathedral and the Bazaar (1999)

Fun fact: I wrote the first version of my "funny" article "Preventing Application Security Issues" before I learned about the existence of Linus’s Law :)

A Formal Checklist on Application Security

If you are looking for a document/standard to use for requirements with your application security program, the best one I know is the OWASP Application Security Verification Standard (ASVS).

There are over 200 items on that list, but following modern software development practices, applying Linus’s Law, and simply reading manuals for the tools and libraries or frameworks you use cover most of them.

Some people call this "Secure Coding Practices."

Secure Coding Practices

There is no universal document I can refer you to. What you can find on the Internet is usually outdated. And on my experience, each company (or team) defines its own secure coding practices.