January 13, 2017 By Scott Koegler 2 min read

There was a time when every application used in the enterprise application portfolio was either selected and deployed by the chief information officer (CIO) or at least vetted under the management of IT. The advent of software-as-a-service (SaaS) computing options led to the rise of shadow IT, which has allowed individuals to make their own decisions about what applications met the needs of their departments.

Today the practice has morphed to a somewhat more controlled version in which departments still exercise relative autonomy because they control their own IT budgets. This trend has put distance between the CIO and the enterprise application portfolio.

Securing Your Application Portfolio

As applications become more specialized to support highly targeted functions, they are also increasingly connected to other applications and datasets in the enterprise. That means the marketing automation system that maintains sales-related data likely accesses product information from supply chain systems and customer data from accounting systems. The connections simplify and accelerate operations. Without adequate oversight and control, however, they can open channels for possible data breaches.

Departments that operate their own applications may understand them well, but they likely lack the technical abilities or authority to validate the level of security as applications connect, as demonstrated by a recent Positive Research Center study. All applications reviewed in the study contained “at least medium-severity vulnerabilities,” while 70 percent had a critical vulnerability. The study noted that the trend had increased steadily over the last three years.

The testing employed automated tools that didn’t require any specific understanding of the target applications, meaning data thieves are able to send their penetration tools across a wide range of enterprises and applications attempting to gain access. Once the tool finds an opening, it can exploit the breach and notify the attacker of the opportunity.

An Arxan Technologies study of applications approved by the U.S. Food and Drug Administration (FDA) found similar vulnerabilities. According to the report, 84 percent of the FDA-approved apps tested failed to address at least two of the Open Web Application Security Project (OWASP) top 10 mobile security risks. Furthermore, 95 percent of those apps lacked binary protection.

The CIO’s New Mandate

Security must be assured for every application in the enterprise portfolio, and that level of responsibility rests at the top of the enterprise IT organizational chart. Attaining an adequate level of assurance on the security of applications is the new mandate for CIOs as data centers and infrastructure control continues to move away from internal to cloud-based systems.

The CIO must become familiar with the entire range of applications being used throughout the enterprise. Moreover, the security leader should be involved at the initial stages of application selection and evaluation to ensure that departmental decisions made to improve functionality don’t open gateways for attackers.

Learn More

To learn even more about the latest Application Security Testing technology trends from Gartner Research, you can also read the “Automation and Integration Critical to Application Security Tool Adoption” report.

More from Application Security

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today