An Organizational View on Application Security

When it comes to integrating application security into an (especially large) organization, we often experience a bunch of practical problems and frustration. In the end, a lot of money may have been spend, but little or no improvement to the security of developed applications have been accomplished.

The main problem that organizations made is that they have an isolated on security activities. For instance, they conduct security training but don’t have related requirements for the developers in place, the training is focused on a non-related technology stack or responsibilities for security have not been defined by the management and communicated to the development teams.

After struggling a while with such problems I came up with the following quadrant:

Quadrant_en

The basic message that is visualized here is that whenever we want to integrate security into an organization we need to consider all for dimensions: organization, guidance & requirements, training and technologies.

Some examples:

  • You plan to improve the security know-how of your developers? Identify roles that will be responsible for security, plan the training based on the technologies the teams actually work with, combine them with (secure coding) guidelines that the developers will later be able to use and look up what they heard.
  • You plan to buy a new code scanning technology? Identify roles that will operate it (ownership) first and that receive the qualification to be able to do it, processes that make sure they are actually used and define requirements that it will test.

When you think about this quadrant, you will find that almost any activity for improving application security can be mapped to it. Always considering all four dimensions will often lead to more effort and planning but clearly to a much higher chance of success and less frustration.

About Matthias Rohr

Matthias Rohr, CISSP, CCSLP, CISM, CCSK, is Founder and CEO of Secodis GmbH. Matthias began working in this field in 2004 and is since a frequent speaker on international conferences, book author and an active OWASP constributor and recently published his first book. He lives and works in Hamburg / Germany.

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *