Logo

dev-resources.site

for different kinds of informations.

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Published at
4/2/2024
Categories
cybersecurity
frontend
owasp
security
Author
lau_blog
Author
8 person written this
lau_blog
open
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

We addressed the question "What is application security?". Now let's address the question "How can teams and companies identify what to protect?", bridging frontend domains and cybersecurity concepts, serving as a practical continuation of security awareness in web applications.

The main purpose is not to precisely or exhaustively define any term but rather to bridge both knowledge shores to build a solid and iterative foundation enabling conceptual tools for a deeper immersion for those who desire it.

How do we identify what to protect by teams or companies

The more we know the web application, the better we can identify the entry points that an attacker sees as the surfaces to attack. Identifying which assets are most vulnerable, and which are most likely to suffer data breaches, information disclosures, or unauthorized access, helps to build the structured representation of the application from the cybersecurity point of view.

Attacker's actions often go from the binary substitution of boolean values like false by true to advanced techniques for chaining vulnerabilities, errors, or behaviors to break into companies, clouds, or networks, steal sensitive data, or blockage the whole company via ransomware. Identifying the pain points allows us to understand and communicate the actual threats we expect and the mitigations we can achieve to protect our company and the software we build.

This structured representation of threats or threats model, identifies potential security risks, enabling proactive measures to protect our digital assets. Conducting comprehensive threat modeling teams can determine the complete attack surface of its components and the interconnected data accesses.

What is Threat Modeling

Threat modeling identifies potential security risks capturing, organizing, and analyzing the web application producing a prioritized list of security and privacy measures, requirements, and implementations for the web application.

Threat Modeling Manifesto

The Cost

Performing threat modeling will be cheaper than remediation costs, let's see why.

Have you heard about PlayStation, Uber, or Yahoo? They have in common a very very expensive characteristic: They all have suffered cyber attacks that cost Hundreds of Millions of dollars. Other companies like Youbit (south Korean crypto exchange) went into bankruptcy after being breached, and 60% of small businesses closed within six months after the breach.

Most Critical Security Risks to Web Applications

Every risk differs from each other by frequency of occurrence, severity, magnitude of potential impact, etc. In this way, we can define a landscape of web application security awareness, explore and include well-known vulnerabilities and mitigations, attacks and defenses, exploitations and practices, to minimize the presence of well-known risks in our web application.

In the Web Application Security field, the OWASP Foundation has maintained a widely agreed list of the Top 10 most critical security risks for Web Applications.

OWASP Top Ten

OWASP standards help companies and developers adopt processes and increase security awareness toward minimizing risks enabling code improvements. In the top ten, we can find Injections like SQL/NoSQL attacks, Outdated or Vulnerable Components, and Security Logging and Monitoring Failures among many others.

Conclusion

Looking through the eyes of the attacker helps to create a defensive analysis, tackling well-known techniques and attacks early, enabling us to build the big-picture map of threats and attack surfaces from our services and web applications.

Working together as one team, we can conduct a comprehensive analysis to construct a holistic fortress that proactively approaches security, empowering frontend software and safeguarding our systems, endowing them with resilience.

owasp Article's
30 articles in total
Favicon
Access Control Security: Learning from Major Data Breaches
Favicon
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation
Favicon
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually
Favicon
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Favicon
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity
Favicon
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Favicon
OWASP Broken Access Control Vulnerabilities
Favicon
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker
Favicon
API Security: Threats, Tools, and Best Practices
Favicon
Top 10 OWASP Vulnerabilities: What Every Developer Should Know!
Favicon
Ethical Hacking - This article is about discovering vulnerabilities in web applications.
Favicon
How to Explore an Exposed .git
Favicon
Compreendendo o SAMM
Favicon
🛡️🌐OWASP - Open Web Application Security Project
Favicon
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
Favicon
Open Web Application Security Project OWASP Top Ten
Favicon
OWASP® Cornucopia 2.0
Favicon
WEB API VULNERABILITY THROUGH OTP
Favicon
Create your own card game with OWASP® Cornucopia
Favicon
Be a Part of OWASP Top 10 2024!
Favicon
SAST Scanning with SonarQube and Docker
Favicon
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules
Favicon
Threat Modeling
Favicon
Securing Self-Hosted Services with CF Tunnel Gate
Favicon
SnowFROC 2024: Securing The Future With OWASP Community In Denver
Favicon
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?
Favicon
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?
Favicon
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity
Favicon
Mastering Application Security: The Power of Rate Limiting
Favicon
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

Featured ones: