How do network attacks impact the security of enterprise Web applications? How can software quality pros do our part to defend against network security threats?
Like a house with a poorly constructed foundation, a Web application that's running in an environment with vulnerable operating systems, databases, and network infrastructure devices is merely there to widen the attack surface and facilitate problems. Unmanaged network security threats make application security practically an illusion.
Although, I find fewer vulnerabilities below layer 7, they still exist and are often there waiting to be exploited. I'm referring to things like:
Mobile application security
You may also want to bone up on OWASP's top ten list of security vulnerabilities for the mobile enterprise.
- Databases and other services exposed to the Internet
- Weak, blank, or default passwords on firewalls, operating systems, and databases
- Missing patches and poor malware protection on servers and workstations that access your applications
- Improperly configured firewall rulebases, often containing stale rules that permit overreach and unauthorized access
- Lack of denial of service protection which can hamper even the most resilient of hosting providers
- Minimal audit logging and no security event oversight or correlation
As a software quality professional, you're about as disconnected from network security as network security professionals are from development and QA. You can't force people's networks to be secure but you can still help make a difference. Work with your team to document a set of recommendations for securely deploying your applications. List out the common flaws and then list out the solutions.
I've found that people simply not thinking about security problems (because they're too busy doing their own jobs) is a major contributor to the information risks we face. Getting network security threats on their radar is half the battle. Beyond that, producing a secure Web presence – at layer 7 – is all you can do.
Dig deeper on Penetration Testing
Related Q&A from Kevin Beaver
For an enterprise application, assuming our development team does lots of little changes (in two- to three-week iterations), how frequently should we...continue reading
Is the PCI DSS a sufficient guideline for implementing an application security program? Should organizations take steps beyond the mandated PCI ...continue reading
The number of endpoint security vulnerabilities is daunting, but endpoint admins should first focus on updating patches against Windows malware.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.