13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Ironically, misused <strong>security</strong>features continue to be the trouble areafor both Web and mobile apps.In a typical <strong>security</strong> development lifecycle, it is recommended that corporations have practicesin place for identifying weaknesses in their applications. As part of that lifecycle, it is theresponsibility of the team to verify that known vulnerabilities and any close variants have beenmitigated. In studying the data from the past year, we have observed that for those applicationsthat are following a <strong>security</strong> development lifecycle, where applications are analyzed more thanonce, over 68 percent of vulnerabilities are being resolved.Overall, the percentage of issues fixed in the Security Features, Encapsulation, and CodeQuality kingdoms are relatively high. It is also interesting to note that in the Input Validation andRepresentation kingdom, where the more well-known vulnerabilities such as cross-site scriptingand SQL injection reside, the percentage of critical and high issues fixed are similar. This couldimply that such injection issues are prioritized and fixed together during implementation.ConclusionKnowledge is power; being aware of the specific circumstances that give rise to vulnerabilities lets<strong>security</strong> practitioners address their root causes—even, if healthy secure development practicesare followed, before they are committed to code and released to an unsuspecting world.For a snapshot of the state of application <strong>security</strong> in 2014, we analyzed a sample set of <strong>security</strong>audits performed by HP Fortify on Demand on 378 mobile apps, 6,504 Web apps, and 138Sonatype <strong>report</strong>s from 113 projects. These audits include results from static, dynamic, andmanual analysis. All identified issues were classified according to the HP Software SecurityTaxonomy (originally the “Seven Pernicious Kingdoms”), updated and refined in mid-2014 andunder continued expansion in 2015.The good news, if there is good news to be had, is that the uproar around such high-profileincidents as Heartbleed and Shellshock may yet lead software developers and architectsto tackle <strong>security</strong> issues, particularly those in foundational or legacy code, more effectively.We saw that repeated scans lead to better software, and that the open-source developmentcommunity seems to be selecting for healthier, better componentry—components with more<strong>security</strong> issues simply aren’t used as often by other developers.That said, vulnerabilities are still pervasive. Sorting the vulnerabilities we discovered intothe categories of our taxonomy, we found every indication that more Web and mobile appscontained discoverable vulnerabilities. Ironically, misused <strong>security</strong> features continue to be thetrouble area for both Web and mobile apps. There were a few differences endemic to each typeof application; the nature of mobile apps means they’re particularly prone to code quality issuesrarely found in Web apps, while Web apps suffer from the types of problems covered in theerrors section of our taxonomy.Progress is possible. Despite the rise in detected vulnerabilities, the very fact that they aredaylighted means that they can be analyzed and addressed. Our <strong>research</strong> indicates that criticalclassvulnerabilities are taken seriously and given patch-development priority—not a surprisingfind, when one remembers that post-release patching remains part of a healthy developmentlifecycle, but perhaps a sign that smart practices truly do take hold and crowd out lesser habitsin the <strong>security</strong> ecosystem.65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!