Our latest SoSS release is a feature supplement, these allow us to extend our analysis to a variety of topical areas. This feature supplement focuses on the actual state ofvendor application security testing programs currently being implemented by our enterprise customers.
Key findings of the report include:
Currently few enterprises have vendor application security testing programs in place, but the volume of assessments within organizations is growing
Less than one in five enterprises have requested a code-level security test from at least one vendor
However, the volume of vendor supplied software or application assessments continues to grow with a 49% increase from the first quarter of 2011 to the second quarter of 2012
There is a Gap Between Enterprise Standard and Industry Standard Compliance
38% of vendor supplied applications complied with enterprise-defined policies vs. 10% with the OWASP Top Ten and 30% with CWE/SANS Top 25 industry-defined standards.
Some of the most dangerous vulnerabilities in vendor applications are also the most prevalent
Four of the top five flaw categories for web applications are also among the OWASP Top 10 most dangerous flaws and five of the top six flaw categories for non-web applications appear on the CWE/SANS Top 25 list of most dangerous flaws.
SQL injection and cross-site scripting affect 40 percent and 71 percent of vendor-supplied web application versions, respectively.
Only 10 percent of applications tested complied with the OWASP Top Ten list and 30 percent with the CWE/SANS Top 25 industry standards
With 62% of applications failing to reach compliance on first submission, procedures for managing non-compliant applications are an important aspect of an enterprise’s security policy
11% of vendors resubmitted new versions of applications for testing but are still out of compliance with enterprise policies
Enterprises that relied on an ad-hoc approach when requesting application security testing averaged four participating vendors, whereas enterprises with a structured approach had much higher levels of success, averaging participation from 38 vendors.
Enterprises with structured programs enabled more vendors to achieve compliance quickly, with 45 percent of vendor applications becoming compliant within one week.
By contrast, enterprises with an ad hoc program only saw 28 percent of third-party applications achieve compliance within one week
The report is chock full of brand new data and graphs galore. If you're an enterprise organization you don't want to miss the latest State of Software Security report!
Neil is a Marketing Technologist working on the Content and Corporate teams at Veracode. He currently focuses on Developer Awareness through strategic content creation. In his spare time you'll find him doting over his lovely wife and daughter. He is a Co-Owner of CrossFit Amoskeag in Bedford NH, his favorite topic is artificial intelligence, and his favorite food is pepperoni pizza.
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
Veracode is a leading provider of enterprise-class application security, seamlessly integrating agile security solutions for organizations around the globe. In addition to application security services and secure devops services, Veracode provides a full security assessment to ensure your website and applications are secure, and ensures full enterprise data protection. Application protection services from Veracode include white box testing, and mobile application security testing, with customized solutions that eliminate vulnerabilities at all points along the development life cycle.
*Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates.
**Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.