Working with different departments to implement application security the right way If you think application security only involves installing a tool, or scanning a few apps and moving on, you’re wrong. Application security is a unique security initiative, and its success hinges on people as much as technology. Employees don’t notice when you implement new anti-virus software. When you create a new firewall rule, it usually only impacts the network manager creating the rule. But application security is different. Because the application layer touches every part of the business and is constantly changing, you can’t just put up a wall or turn on a device to secure your apps. Rather, effective application security will require people in your organization to change their behaviors, their workflows, even their mindsets.You’ll need to get buy-in from and consider the implications to multiple groups across your organization.DevelopmentAn AppSec initiative will stall before it starts if your dev team isn’t on board. It’s a must to work security into the earlier stages of development. But go-to-market strategies and competitive pressure often lead to hard deadlines that become developers’ sole priority — they want to avoid anything that might encumber their workflows. Avoid the resistance by doing some homework on the development processes at your organization, studying the best ways to integrate security into those processes. Then get development and DevOps teams involved early during the planning phase. Approach the problem by giving them the power to influence the program’s protocols, making them vested partners in the project rather than recipients of a long list of rules. Getting development buy-in before the strategy launches lessens the chance of development teams ignoring security protocols and guidelines.Executive teamYou need executive buy-in to ensure your program gets the support and funding it needs. When you have the C-Suite’s ear, talk less about static and dynamic analysis and more about the bottom line. For instance, explain the risk that vulnerabilities in the application layer pose to an organization’s reputation and revenue streams. Leverage examples like TalkTalk, which lost about 100,000 customers and incurred about $130 million in costs and loss revenue due to breach. In addition, highlight how the assessment cycle will speed up development, as it reduces the cost of remediation post-production while streamlining go-to-market timelines. LegalEspecially if you are embarking on a third-party application security program, strong buy-in and support from your legal team is key. Your legal department will help you craft language to make sure your vendor contracts are consistent with the security policies you want to enact. They will also evaluate whether your security demands are reasonable and enforceable. Conversely, the legal team will also help you craft language around your own security posture in situations where you are the software vendor.MarketingThis is probably not the first group that comes to mind when you think application security, but this group often purchases the most apps. Not to mention it can be an ally in promoting and communicating your AppSec program. In an effort to move quickly, marketing departments sometimes unwittingly circumvent security. When working with the marketing team, the most important thing you can do is to inform them of the risk and the policies you want to put into place. Then enlist their help in communicating your AppSec policy and its success. Ultimately, applications are thoroughly embedded into every part of your organization. You’ve got different people developing, assembling, updating, purchasing, uploading, selling and using apps constantly. In this light, securing them will take an equally diverse mix of people and an all-encompassing approach. Related content opinion The ethics of creating secure software The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of societ By Chris Wysopal Sep 07, 2018 5 mins Enterprise Applications Security Software Development opinion Blockchain only as strong as its weakest link The blockchain might be secure, but is all the software interacting with it? In many cases, no. We’ve seen in an increase in cyberattacks due to vulnerabilities in the software side of the blockchain, from wallets to smart contracts to exchange By Chris Wysopal Aug 06, 2018 4 mins Blockchain Security opinion Keeping the Stars and Stripes secure Some of the most pressing threats to our national security are found not in the physical world, but in cyberspace. It's past time for our nation to adapt to the changing landscape and bring our security infrastructure up to speed. By Chris Wysopal Jun 15, 2018 5 mins Government IT Government Technology Industry opinion The good, the bad & the ugly of using open source code components Using these risky snippets of code has become standard for developers, but what do they actually think about them? By Chris Wysopal May 09, 2018 5 mins Application Security Open Source Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe