Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

man standing out crowd individual

You could say Kris Lahiri, VP operations and chief security officer at enterprise file sharing platform provider Egnyte, was a bit of a skeptic when he first considered adding crowd-sourced penetration testing to the firm’s application security regimen. Indeed, the idea of giving permission for a bunch of unknown eyes to scour over their systems to see what they uncover is enough to make many security professionals hesitant.

Kris Lahiri Egnyte, Inc.

Egnyte COO and CISO Kris Lahiri

Over the years since its founding in 2007, Egnyte's approach to ensuring it was releasing software that didn’t place customers at-risk went through the evolution one would expect. Initially, the company identified and mitigated web application flaws that slipped through development with manual web application tests, explains Lahiri, but hiring outsiders to conduct software code assessments proved to be more time-consuming for their pace of updates. “We realized that the entire process takes about two to three weeks, and we could never move rapidly. Being a software-as-a-service company, we are innovating fast,” Lahiri says. Lahiri explains that, typically, Egnyte publishes new software updates, features and enhancements every two weeks. “It became clear that deep-dive manual application security assessments every six months, while valuable, is too slow,” he says.

So that their application security assessments kept pace with the frequency of their software updates, Lahiri and his team turned to automated web application security assessment services. “While these platforms do check apps for potential flaws, and are quite effective, they do require considerable training to learn how an application works to be optimally effective,” he says. Lahiri says he wasn’t comfortable with the lag time between when an update is published or a new application is released and when a web application assessment tool became adequately trained.

Also, even when fully trained it is possible for web application assessment tools to miss software flaws. This is especially true for web applications, which tend to be more dynamic than most other types of applications. "Web application assessment software also lags behind development trends and toolsets. Development tools change so often that web application security assessors need to stay very focused just to keep up," Lahiri says.

“While we realized that we had to pay more attention to training automated software assessment tools, we also realized that there were many types of risks, such as missing some input, or social engineering type attacks, or someone trying to escalate privileges that are not readily, or even possible, to detect in purely automated way,” Lahiri says.

The decision to crowdsource application security

Lahiri began to consider adding crowd-based software security testing provided by application security startup Cobalt Labs to Egnyte's processes. The idea would be to find any security related flaws that made it past internal software security tests during development, automated application security tests, and periodic manual web application pen tests. But he remained skeptical. “My first doubt was because we are a startup and weren’t interested in running a public bounty program as a Facebook or Google would. Also, I wasn’t sure about the type or quality of researchers we’d get. Finally, I worried that a flaw uncovered could become public and tarnish the company brand,” he says. “I hesitantly went ahead, and we tried a crowd-sourced application security program,” he says.

To continue reading this article register now

7 hot cybersecurity trends (and 2 going cold)