How do network attacks impact the security of enterprise Web applications? How can software quality pros do our part to defend against network security threats?
Like a house with a poorly constructed foundation, a Web application that's running in an environment with vulnerable operating systems, databases, and network infrastructure devices is merely there to widen the attack surface and facilitate problems. Unmanaged network security threats make application security practically an illusion.
Although, I find fewer vulnerabilities below layer 7, they still exist and are often there waiting to be exploited. I'm referring to things like:
Mobile application security
You may also want to bone up on OWASP's top ten list of security vulnerabilities for the mobile enterprise.
- Databases and other services exposed to the Internet
- Weak, blank, or default passwords on firewalls, operating systems, and databases
- Missing patches and poor malware protection on servers and workstations that access your applications
- Improperly configured firewall rulebases, often containing stale rules that permit overreach and unauthorized access
- Lack of denial of service protection which can hamper even the most resilient of hosting providers
- Minimal audit logging and no security event oversight or correlation
As a software quality professional, you're about as disconnected from network security as network security professionals are from development and QA. You can't force people's networks to be secure but you can still help make a difference. Work with your team to document a set of recommendations for securely deploying your applications. List out the common flaws and then list out the solutions.
I've found that people simply not thinking about security problems (because they're too busy doing their own jobs) is a major contributor to the information risks we face. Getting network security threats on their radar is half the battle. Beyond that, producing a secure Web presence – at layer 7 – is all you can do.
Dig Deeper on Penetration Testing
Related Q&A from Kevin Beaver
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an ... Continue Reading
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.