Feeds

Time to dismount the hamster security wheel of pain

Quit patching, build a library

Next gen security for virtualised datacentres

If you're tired of the application security scan-and-patch hamster-wheel-of-pain, then it's time establish just such a library. But what of the classic pain point of actually getting people to use the library, rather than falling back on established practices and techniques? Once you show that using this "secure" approach is the fastest and easiest way to get applications built, you'll see dramatically increased levels of interest in the library.

So how do you create your enterprise security library?

Most organizations need roughly 100 methods across all the different security controls, organized into a simple library. Every organization's library will be a little different, as they each use different platforms, systems, directories, databases and infrastructure.

While many organizations have standardized approaches for authentication, access control, and perhaps logging, most have not created common solutions for critical areas like input validation, encoding, encryption and error handling.

You may be able to search your best applications for these mechanisms and institutionalize them. The best approach is to spend some time designing the API for your organization's security needs, and then implementing the mechanisms.

Assuming your library is critical, you'll want to spend time on design reviews, code reviews, and security testing. Borrowing the "test-first" technique from agile methodologies is a great way to develop a test suite that you can use for regression testing.

Faster, shorter, simpler

Organizations that create a standard security library for developers will experience significant cost savings across the entire software development lifecycle. By simplifying application security, many activities across the lifecycle will take less time and yield better results. For example, security training will be shorter and more focused, security requirements reduced to half their former size, and security design and implementation will be easier. Security testing will become more effective and remediation much simpler.

Application security is getting more complicated every day with increasing connectivity, more mixing of code and data, more parsers, more interpreters, more assets, and more functionality available.

We have to take steps now to simplify the problem. So if you're tired of securing one application at a time, and wrestling with the same vulnerabilities again and again, establishing your organization's standard security library is one of the best things you can do.®

Jeff Williams is the founder and CEO of Aspect Security and the volunteer chair of the Open Web Application Security Project. His latest project is the Enterprise Security API, a free and open set of foundational security building blocks for developers.

Build a business case: developing custom apps

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.