Secure coding is a challenge that every software company in the world faces. Even the largest companies that attract the best developers in the world (Read: Google, Facebook) have had instances of vulnerabilities in their code ranging from XSS to SQL injection to backdoors. The software industry is the world's largest manufacturing industry ($400B) with NO notion of security quality! Before we jump further into the topic let's take a look at why insecure code exists in the first place.
There are a few reasons why insecure code exists in the first place and it's not an issue easily solved. Among these reasons are variables like schedule pressure, any developer can understand the pressure of deadlines and management pushing to have software out before it is properly checked for vulnerabilities. Developer education is another variable that is inconsistent and difficult to avoid. There's no standardized certification that allows a company to avoid having to deal with the various backgrounds in coding each developer brings to the table. This ties directly in with the ever evolving landscape of internet software which always introduces new vulnerabilities and changing threats. Every innovation in software brings a new set of potential vulnerabilities that have to be accounted for, checked and assessed across a variety of platforms. Secure coding is an extensive process but a necessary one to safeguard your software for the future.
There are four common approaches to securing code and each comes with benefits and drawbacks. Let's summarize each quickly;
Hiring independent security consultants typically gives the highest quality results (dependent naturally on the quality of the consultants themselves). However the problems with doing so are that Security Consultants are very expensive compared to other options, they are also in short supply which leads to longer processing time that is often very detrimental to development life cycles.
In house developers are a natural solution to the secure coding issue but they're often not provided with the proper "contextual" security training required to solve the unique vulnerabilities their code may be exposed to. There is also the issue of priorities within the company where other tasks may take the time that should be devoted to code analysis.
The implementation of secure coding processes directly into your business' SDLC is perhaps the most ideal solution yet also the most difficult. They can take years to fine tune properly and as a result have an extremely low adoption rate; less than 1% of US companies are CMMI Level 5 certified. So what is the best option for integrating security into your company's SDLC? CA Veracode offers a key innovation in code level binary assessments, what does this mean? Read on to learn more.
Binaries are the attack surface for hackers. They are the computer executed code that is exposed across the internet to anyone interested in accessing your programs, the final product so to say. A Binary is the result of the code you write, any 3rd party software you integrate, along with open source, outsourced and crowd sourced code that goes into your application. The benefits of binary assessments are numerous. They include all supply chain security risks and because the scanned code is the executable, there's no risk of compromising your intellectual property. The information from binaries provide key linkages to traditional perimeter defense solutions like backdoors and malicious code that typically lives in binaries. Binary assessment is the singular innovation required to leverage the Cloud to create a highly scaleable managed testing service.
"Only one vendor, CA Veracode, has an offering that can perform a true binary analysis." - Gartner
CA Veracode delivers a cloud-based application security testing platform. CA Veracode customers upload their applications to CA Veracode's cloud based platform. The CA Veracode Platform runs various security scans against the uploaded application. CA Veracode provides a report that allows developers to fix and correct the flaws found in the application code.