chapter three
3 Components of application security
This chapter covers:
- Building a threat model
- Using developer tools to mitigate software security issues
- Security Analysis tools used in the development pipeline
- Protection tools that are available for running applications
- Vulnerability collection, correlation, and prioritization
- Bug Bounty and Vulnerability Disclosure programs
- Where security fits in the SDLC
So, you have seen the issues that are caused by not having application security integrated into your lifecycle and you’re starting to ask the great question of where to start. There is a not a one size fits all package that works for all organizations. A lot depends on the following:
- Size of the organization
- The industry and the regulations impacting the organization
- The culture of the organization
- The security budget at the organization