Application Security
(AppSec) and Its
Importance
Application security (AppSec) protects software applications from
threats throughout their lifecycle. It prevents unauthorized access,
data theft, and operational disruptions.
What is Application
Security?
Definition Purpose
Processes, techniques, and Prevents adversaries from
tools that protect software exploiting vulnerabilities to
applications from threats gain unauthorized access or
throughout their lifecycle. steal data.
Evolution
Has evolved from monolithic on-premise applications to cloud-
based microservices architecture.
Traditional vs. Modern Applications
Traditional Applications Modern Cloud Applications
Monolithic architecture with all components combined Microservice architecture with independent services for
into a single program. easier updates.
Installed on single machines, often on-premises or self- Deployed in single-cloud or multi-cloud environments.
hosted.
Automatically adjust resources based on demand for
Updates require altering the entire system with manual flexibility and scalability.
maintenance.
Continuously download updates and patches
automatically.
How Application Security Works
1 Threat Modeling
Analyzing applications to identify potential vulnerabilities and develop
mitigating controls.
2 Secure Coding
Writing code less vulnerable to attacks using input validation and error
handling.
3 Vulnerability Scanning
Using automated tools to scan for vulnerabilities like unpatched software
and misconfigurations.
4 Access Control
Implementing authentication and authorization to ensure only authorized
users access applications.
More Security Controls
Encryption Firewalls Security Monitoring
Translating data into Creating barriers
another form that only between external Watching applications
people with access to a networks and for suspicious activity
secret key can read. applications to block and responding to
unauthorized access. incidents promptly.
Web Application
Firewalls
Monitoring and filtering
traffic to prevent
common web attacks
like SQL injection.
Why Application Security Matters
Business Continuity
1 Maintains operations
Customer Trust
2 Builds loyalty
Regulatory Compliance
3 Avoids penalties
Attack Prevention
4 Reduces breach risk
Data Protection
5 Safeguards sensitive information
Organizations rely on applications to handle sensitive data and run operations. Proper security reduces cyber attack risks and builds customer trust.
Application Security Testing
Types
1 Static Application Security Testing (SAST)
Analyzes source code during development to identify vulnerabilities
before deployment.
2 Dynamic Application Security Testing (DAST)
Tests running applications to identify vulnerabilities and observe
responses to simulated attacks.
3 Interactive Application Security Testing (IAST)
Combines SAST and DAST techniques to detect vulnerabilities in real-time
during application use.
4 Software Composition Analysis (SCA)
Scans code to identify third-party and open-source components and
detect common vulnerabilities.
More Testing Approaches
Runtime Application Self-Protection (RASP)
Monitors applications while running to protect against
behaviors that traditional security might miss.
API Testing
Verifies reliability, performance, and security of API endpoints
that enable information sharing.
Infrastructure as Code (IAC) Testing
Tests code used to automate infrastructure deployment to
verify reliability and correctness.
Penetration Testing
Simulates cyber attacks to identify vulnerabilities and
security weaknesses that attackers could exploit.
Consequences of Inadequate Security
Data Breaches Financial Loss Reputational Business Disruption
Damage
Unauthorized access to Direct costs from System downtime and
sensitive customer or breaches, regulatory fines, Loss of customer trust and operational interruptions
business data leading to and lost business brand value after security affecting service delivery.
exposure. opportunities. incidents become public.
Common Cyber Attack Vectors
Malware Attacks
Phishing Attacks
Malicious software designed to
Fraudulent messages tricking 2 damage systems or steal data.
recipients into revealing sensitive 1
information.
SQL Injection
Inserting malicious SQL code into
3 database queries.
DDoS Attacks 5
Overwhelming systems with traffic Cross-Site Scripting
to cause service disruption. 4 Injecting malicious scripts into
trusted websites.
More Common Attack Vectors
Malicious Insiders
1 Employees or contractors abusing legitimate access
Password Attacks
2 Attempts to crack or steal authentication credentials
Misconfiguration
3 Security gaps from improper system setup
Poor Encryption
4 Weak or missing data protection
These attack vectors represent common ways adversaries target applications. Organizations must implement controls to address
each type of threat.
The OWASP Top 10 and API Top 10
What Is It? Based On
A standardized list of the Real-world data and
most critical security risks to feedback from security
web applications maintained experts, making it a reliable
by the Open Web guide for application
Application Security Project. security.
Benefits
Provides a common language for discussing risks and
solutions, helping organizations communicate about security
posture.
Cloud Application Security
1 Definition
Practices and technologies that protect applications, infrastructure,
and data in cloud environments.
2 Importance
Essential for organizations using third-party cloud providers like
Amazon, Google, or Microsoft.
3 Challenges
Third-party relationships can increase the attack surface by exposing
new vulnerabilities and risks.
4 Common Threats
Misconfigured environments, poor encryption, weak access controls,
and DDoS attacks.
Web Application Security
Definition Benefits Challenges
Protection of websites and online Web applications provide cross- Complex infrastructure makes web
services against vulnerabilities, platform compatibility and applications susceptible to
threats, and attacks. accessibility through any browser. vulnerabilities at each layer.
Common threats include SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), insecure direct
object references, and unvalidated redirects.
Mobile Application Security
Mobile application security protects apps on smartphones and devices. With widespread mobile use, these applications are critical to
business operations and handle significant user data.
Mobile Security Threats
Insecure API Man-in-the-Middle Code Tampering
Connections Attacks
Hackers modify source
Inadequately Attackers manipulate code of open-source
integrated APIs that data exchanged libraries to introduce
expose sensitive data between the vulnerabilities.
or functionality. application and server.
Reverse
Engineering
Attackers analyze
application code to
understand and exploit
its inner workings.
Implementing Effective
AppSec
Assess Current Posture
Evaluate existing applications and identify security gaps through
comprehensive scanning.
Develop Security Strategy
Create a plan that addresses identified vulnerabilities and
establishes security standards.
Implement Controls
Deploy appropriate security measures based on risk
assessment and business needs.
Continuous Monitoring
Regularly scan for new vulnerabilities and maintain
vigilance against emerging threats.
Your APPSEC Journey
Authentication, Authorization
Develop a secure Web App with Authentication and Authorization
using the Nodejs Stack
Open Web Application Security Project (OWASP API)
Implement OWASP into Web Application
Important Dates
Part 1: Assignment Submission (20%) - Week 06
Part 2: Assignment Presentation & Demonstrations (10%) - Week 07
Part 3: Case Study Interim Submission (20%) - Week 12
Part 4: Interim Presentation & Demonstrations (10%) - Week 13
Part 5: Case Study Final Submission (20%) - Week 16
Part 6: Final Presentation & Demonstrations (20%) - Week 17