How can we ensure the security of Web applications? (1)

Source: Internet
Author: User

Web applications are at the forefront of most enterprise applications today. Web applications can provide different functions in a complex hybrid architecture. It involves a wide range of services, from service-oriented solutions running on the latest cloud technology to older multi-layer Web applications, the Web portal that allows customers to access old applications on large hosts has its applications.

Managing risks related to these complex Web applications is an inevitable requirement of the company, and the security of the underlying code running these Web applications directly affects the risk situation of the company's application available data. Unfortunately, developing reusable and efficient Web Application Security Practices is not a simple task. Many organizations attempt to use post-production solutions to provide security control, such as Web application firewall and intrusion defense systems.

However, it is too late to deploy the security mechanism until the production phase of the lifecycle, and its effectiveness is too small. Design or architecture problems are easier to solve in the early stages of the life cycle. The cost will be extremely high if the application is put into production and then "final. Web Application Security Vulnerabilities can cause data leakage and violation policies. In addition, patching or comprehensive code repair after deployment will greatly increase the total cost.

To ensure benefits and efficiency, the security of Web applications must begin from the definition stage of the requirement to the final receiving stage. This approach requires all designers to work together as a team throughout the process. In the implementation and testing phases, automated tools that follow policies can support repeated tests, and the development cycle can be faster as the testing process is standardized.

Building security at the initial stage of the development process may not be complicated. Security checks and balances are implemented throughout the development cycle to achieve faster release cycles and greatly reduce Web application vulnerabilities.

High cost of implementing security testing at the end of the development cycle

Adding security checkpoints to the development process can indeed reduce the overall delivery time. This sounds a bit intuitive, but after the Web Application Deployment enters the production stage, the cost associated with correcting design errors and code errors is extremely high.

For example, in many development environments, security and review experts often appear at the end of the development cycle. At this point, the application has been completed, and any delay is seen as a redundant bottleneck. Enterprises require quick release of software products, which means that security control may be ignored and Web applications are not properly audited. In this time-sensitive environment, even if scanning tools report a large number of vulnerabilities but are not verified, they are not prioritized. This scan also has more disadvantages than advantages.

When security audits are performed later in the development process, rather than working together throughout the development cycle, the release time may be delayed, especially when some serious errors are discovered. The cost of fixing design and coding errors at the end of the development cycle is much higher than the cost of early error discovery. According to a study by the National Science Foundation of the United States, if serious software problems are identified and corrected at the demand and design stage, the cost is about 100 times lower than the cost of discovering problems after the software is put into production.

When building security in Web applications, in most cases, the goal is not to build a solid Web application, or to clear every possible vulnerability. Instead, the goal should be to match the required features with a recognized risk forecast for Web applications. Throughout the development cycle of Web applications, the goal should be to implement software guarantees, that is, the functionality and sensitivity levels that adapt to specific Web applications, there is reason to ensure that the software will continuously implement the features it requires, even if the software is under attack.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.