UPDATED 09:00 EDT / JUNE 09 2020

SECURITY

Report finds strong relationship between security and engineering in DevOps

A new report from Cobalt.io has found that there is a increasingly strong relationship between security and engineering in DevOps, in which software developers and information technology departments work closely together to create applications faster and better.

The State of Pentesting: 2020 report, released today, explores the state of application security, including insights from a survey of more than 100 practitioners in security, development and operations. Pentesting, short for penetration testing, involves simulated attacks on applications or networks to check security posture.

The report found that 78% of those surveyed reported a strong relationship between security and engineering in what its claimed to be representative of a transition organizations are making from DevOps to DevSecOps. A little over half of respondents said that their organizations pentest applications at least quarterly, while only 16% pentest annually or biannually.

Organizations are said to pentest many different types of applications with cloud environments continuing to present significant risk particularly with security misconfiguration. Just over half of respondents said they conduct pentesting on Amazon.com Inc.-based cloud environments alone. Notably, the report found that the most common type of vulnerability discovered is misconfiguration followed by cross-site scripting, authentication and sessions, sensitive data exposure and missing access controls

“As DevOps hastens the pace of software release, data and automation are essential to scaling security,” Caroline Wong, chief strategy officer at Cobalt.io, said in a statement. “With increased demand for pentesting and higher expectations for application security, the relationship between security and engineering hinges on operational efficiency through automation.”

While extolling the virtues of automated pentesting, the report also states that there are some exploits that humans are better at detecting, such as business logic bypasses, race conditions and chained exploits. Examples where both humans and software are best at working together include authorization flaws such as insecure direct object reference, out-of-band XML external entity, SAML/XXE Injection, DOM-based cross-site scripting, insecure deserialization, remote code exploitation, session management, file upload bugs and subdomain takeovers.

“As web applications become more complicated and scanners improve efficiency, this report reveals a widespread need for applying security fundamentals to complex problems,” said Vanessa Sauter, security strategy analyst at Cobalt.io. “Whether mitigating security misconfigurations or identifying business logic bypasses, a thorough understanding of system architecture and an ability to think both methodically and creatively proves essential to mitigating the most serious threats to application security.”

Image: Pxhere

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU