Logo

dev-resources.site

for different kinds of informations.

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Published at
4/2/2024
Categories
cybersecurity
frontend
owasp
security
Author
lau_blog
Author
8 person written this
lau_blog
open
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Let's address the question "What is application security, and how can teams and companies identify what to protect?", bridging frontend domains and cybersecurity concepts, serving as a practical continuation of security awareness in web applications.

The main purpose is not to precisely or exhaustively define any term but rather to bridge both knowledge shores to build a solid and iterative foundation enabling conceptual tools for a deeper immersion for those who desire it.

I'll split the content into two parts, presenting here "What is application security", and "How can teams and companies identify what to protect" in the following part.

What is Application Security

Application security is about taking steps to ensure that the software we're building and deploying is protected from dangers.

It involves taking actions and procedures throughout the application life cycle to ensure and prevent malicious actors from accessing data.

In simple terms, It is like having smoke detectors to alert us of vulnerabilities or issues found within our code, helping to identify and implement measures to ensure the security of the application.

Likelihood of Vulnerability in Key Areas of Web Applications Development Prone to Exploitation

Vulnerabilities in code can exist for different reasons:

  • Legacy code or lack of maintenance.
  • Evolution of code can introduce new vulnerabilities due to various factors such as changes in functionality, integration of third-party components, or unintentional oversight security considerations during development.
  • Supply chain vulnerabilities and risks associated with dependencies in the NPM ecosystem.
  • Insecure patterns in components.
  • Lack of API governance relying on the network's security.
  • Not considering an "attacker perspective" disrupting the subsequent "defender analysis".
  • etc.

Scanning the codebase

Scanning tools help to secure the application landscape by analyzing and detecting threats from a crossed and multilateral perspective: reinforcing best security practices, analyzing dependencies for vulnerabilities or malicious code (supply chain attacks example), and highlighting security flaws, among others.

  • Static scanners analyze files (the codebase) to highlight mostly insecure implementations or patterns.
    • Early occurrence in the Software Development Life Cycle. Kind of A priori deployment (analysis of the application before running).

Static Application Security Testing Tools Overview

In a rush, I analyzed ten SAST tools based on two keys: readiness (how quickly they could be downloaded, installed & used) and usability (how easily the selected tool could be used). The analysis was not exhaustive and the tools were:

  1. Checkmarx - https://checkmarx.com
  2. Contrast Scan - https://contrastsecurity.com/contrast-scan
  3. Coverity Scan - https://synopsys.com/software-integrity/security-testing/static-analysis-sast.html
  4. Fortify Static Code Analyzer - https://microfocus.com/en-us/cyberres/application-security/static-code-analyzer
  5. HCL AppScan - https://hcltechsw.com/appscan/offerings/source
  6. Kiuwan Code Security - https://kiuwan.com
  7. Reshift (NodeJs) - https://reshiftsecurity.com
  8. SonarQube - https://sonarqube.org/features/security/
  9. Semgrep - https://semgrep.dev
  10. Snyk - https://snyk.io/product/snyk-code/

All of them have in common that they are free and support Javascript, in the end, Snyk and Semgrep were both those with the higher readiness and usability: I started using them with a few clicks, easy to use CLI, both had a clean and useful dependency analysis results and code analysis.

In contrast, most of the other tools required users to "book for a demo", delaying access to the tool and relegating the experience from immediate to later, or were not sufficiently simple to use when considering the learning curve over time, or forced third-party authentication, which I declined to proceed considering sharing my profile as a way of opening an unintended risk vector for my company.

In no way is my opinion based on their quality, effectiveness, or efficiency, and it is not my intention to not recommend any of them, as I have not tried them.

The code to test should be according to the task of highlighting security flaws, so the target software was the well-known "Very Insecure Web Application" called Juice Shop.

Benefits

  • Requiring no app execution, the scan is faster as testing suites.
  • Applies all the rules to the whole codebase.
  • Indicates problematic code locations and explains the issue found making flaws simpler to understand and remediate.

Limitations

  • False positives and false negatives.
  • Language specificity

Examples

  • Semgrep

Semgrep

  • Snyk

Snyk

owasp Article's
30 articles in total
Favicon
Access Control Security: Learning from Major Data Breaches
Favicon
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation
Favicon
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually
Favicon
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Favicon
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity
Favicon
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Favicon
OWASP Broken Access Control Vulnerabilities
Favicon
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker
Favicon
API Security: Threats, Tools, and Best Practices
Favicon
Top 10 OWASP Vulnerabilities: What Every Developer Should Know!
Favicon
Ethical Hacking - This article is about discovering vulnerabilities in web applications.
Favicon
How to Explore an Exposed .git
Favicon
Compreendendo o SAMM
Favicon
🛡️🌐OWASP - Open Web Application Security Project
Favicon
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
Favicon
Open Web Application Security Project OWASP Top Ten
Favicon
OWASP® Cornucopia 2.0
Favicon
WEB API VULNERABILITY THROUGH OTP
Favicon
Create your own card game with OWASP® Cornucopia
Favicon
Be a Part of OWASP Top 10 2024!
Favicon
SAST Scanning with SonarQube and Docker
Favicon
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules
Favicon
Threat Modeling
Favicon
Securing Self-Hosted Services with CF Tunnel Gate
Favicon
SnowFROC 2024: Securing The Future With OWASP Community In Denver
Favicon
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?
Favicon
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?
Favicon
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity
Favicon
Mastering Application Security: The Power of Rate Limiting
Favicon
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

Featured ones: