Securing Your Software - Be Ready, DON'T Get Ready

Securing Your Software - Be Ready, DON'T Get Ready

Software security has always been misconstrued as IT Security. Whenever people are asked 'Is your software secure?', the reaction is "We have firewall". :-). Well, it is high time people get more knowledgeable...!

With the advent of digital age, when all, well almost all, software applications are on the web and mobile. This leads to applications falling prey to attacks from various corners where people are continuously sniffing for such vulnerable software. Many enterprise also works with a false comfort that 'my application is not external facing and thereby not prone to attacks'. OWASP - the most popular online security community - tells that many of internal facing application also has been prone to attacks, often more than what is thought of.

It would not be long that few odd sounding cyber news would start becoming Headlines across the globe. My creative mind is suggesting some possibilities below: -

While this is from my wild imagination (if something is already happening, God Save The World) , never think this is not going to happen. This could happen and could happen very soon...!

The Security Architecture

Attacks to software application happens after the network and operating system has given way - this is in the simplest form.

Lloyds insurance CEO puts the cyber crime costs to businesses at $400 Billion a year. This tells how much is in stake for the businesses and how much it is important to secure our software applications.

Security Threat Modeling - The Start

It is important to do security threat modeling before we jump into security review of the source code. While threat modeling is primarily to safeguard enterprise interests, it more should look from Attackers Mindset than Defenders Mindset.

It goes beyond this post's scope of describing threat modeling, but entities like OWASP have got resources that could help in doing effective threat modeling. Security Threat Modeling should consider the following: -

  • Sources of Threats
  • Attack Surface - defined through the application internal & external interfaces
  • Possible Attacks - where can the salvo be served from
  • Potential Business / Technical Impacts
  • Required controls - this is decided based on organization's risk appetite

CyberSecurity Market Ventures projects an expenditure of $1 trillion on cybersecurity initiatives from 2017 to 2021.

Build the Right Team

It is important that you build the right team to secure your software applications. Right people are the ones who have got expertise in thinking creatively on how an attacker can damage, and implement controls. It is not the technical skill alone that makes a person a good security auditor / reviewer, but ability to understand the business context and review the application matters most.

Just a small addendum, DevOps stresses on security of application and there is a new branch of it called DevSecOps that is becoming strong. Software security is a moving target, what was strong yesterday is fully vulnerable today, and that's the fun in it...!

What I've given here is the start, there is more to Secure Software Development...! Happy Securing...!

#softwaresecurity #securecoding #csslp

Cover image credit: http://edgeone.com/wp-content/uploads/2015/07/software-security-pic.jpg

To view or add a comment, sign in

More articles by Ramkumar Ramachandran ⇗

  • ISO/IEC 27701:2019 - The New Data Privacy Standard

    With the advent of GDPR that applies to personal data of European 'Residents', there has been a flurry of activity in…

    1 Comment
  • California Consumer Privacy Act Primer

    Lot has been discussed globally about data privacy and the new addition is California Consumer Privacy Act (CCPA). This…

    5 Comments
  • GDPR Myths

    GDPR is hot and along with it comes its own myths. You keep hearing many stories that 'looks true' but you have your…

    3 Comments
  • GDPR Case Study # 2

    Hi Folks, here is the second case study in the sequence that I've planned to publish. Incidentally, the heat is just on…

    3 Comments
  • GDPR - Case Study # 1

    Hi Folks, I've decided to publish sample case studies on GDPR. Looking at the interest from public I will give more…

    5 Comments
  • 5 Mantras for a Great Startup Ecosystem

    Mantra # 1 Have A Unique Idea It is important that idea is great, but is more important that is unique as well. MeToo…

    1 Comment
  • Threat Modelling - Connected Cars

    Well, threat modelling is too much of a sophisticated term that I'm using here, but the message is to tell how…

    17 Comments
  • IT Services Industry - Under Pressure & Enjoying

    The best time to improve operational efficiency is when under stress..

  • DevOps - The Myth Buster

    Well, DevOps is the new buzz. You know about DevOps and that's why you are here to read this post, curiously.

    6 Comments
  • Autonomous Cars - Just Get Ready

    Whether you like it or not, believer it or not, would like to drive it or not, it is THERE. You will be driving.

    2 Comments

Others also viewed

Explore content categories