5 Ways RASP Transforms Your Application Security Program

TECHNICAL BRIEF | 5 WAYS RASP TRANSFORMS YOUR APPLICATION SECURITY PROGRAM 1 RASP DELIVERS UNPARALLELED VISIBILITY Knowing where to focus is more than half the battle when it comes to protecting production applications: Where are all the applications? What security events are happening? Are applications being attacked? Inventory Large organizations have hundreds and even thousands of applications deployed for use by customers, partners, and internal users. Creating an inventory of applications – just finding them – can be a daunting task. Contrast Protect instrumentation is installed via an agent on an application server, allowing organizations to identify all applications on every server with an agent. Simply placing a RASP agent on application servers automatically creates an enterprise application inventory. Event Logging When it comes to security events, most large organizations, and many smaller ones, have Security Information and Event Management (SIEM) solutions that gather log data from network and security devices, and from packaged enterprise applications (e.g., Oracle, SAP, and Infor). But, custom applications usually log only exceptions and debug information, and ignore security-relevant events. That’s because most custom applications are not built with security or compliance logging in mind, and efforts to retrofit that functionality compete with business pressures to advance and improve core application functionality. For legacy applications, it may even be that resources are no longer available to modify the application. RASP enables and dramatically simplifies custom application security logging. RASP instruments the entire application, and RASP policies can be created to generate log events when relevant portions of the application are accessed or other conditions are met (e.g., logins, transactions, privilege changes, etc.). Policies can also be added and removed as necessary – for example, as part of incident investigations. With RASP, all of this application logging is possible without modifying application source code or redeploying. Attacks One of the most important areas of visibility for application security professionals is attacks. Having proof that applications are indeed being attacked – and therefore need to be secured during development and protected in production – is valuable information to be shared with security and business executives. Information about attacks is also required to demonstrate the importance of application security initiatives and to validate the need for additional investments. 3 WELCOME TO THE ERA OF SELF-PROTECTING SOFTWARE | CONTRASTSECURITY.COM TECHNICAL BRIEF | 5 WAYS RASP TRANSFORMS YOUR APPLICATION SECURITY PROGRAM 2 RASP ACCURACY MEANS MORE PROTECTED APPLICATIONS Accuracy has been the main barrier preventing the widespread adoption of application security products. Today, most applications are not protected against attacks in production because IT Security and Security Operations teams are reluctant to trust network-based application security products. They generate too many false positives and require constant tuning. With improved product accuracy, organizations can protect more of their application portfolio. Protecting against application attacks has, historically, meant attempting to block them at the network level. Over the last 25 years, network protection has moved closer and closer to the application – from the firewall, to the intrusion prevention system to the web application firewall (Figure 2). That evolution has involved looking deeper and deeper into HTTP, SOAP, XML and other application-layer network protocols. The reason for this migration is simple: the better you understand applications, the more accurately you can detect and block application attacks. Figure 2: Evolution of Network-based Application Attack Prevention Network Firewall* Intrusion Prevention System (IPS) Web Application Firewall Late 1980s Mid 1990s Late 1990s * Next Generation Firewalls (mid-2000’s) blend Firewall & IPS functions RASP instrumentation delivers a level of accuracy not possible with network security approaches. It enables application security to be positioned as close as possible to the application: literally within it! Legacy network-based approaches are inherently inaccurate when it comes to understanding application behavior because they are outside of the application itself. As a result, they have to build models (i.e., approximate, assume, and guess) of what an application might do with a given input. Increased accuracy transforms the equation, allowing organizations to confidently protect more of their application portfolio with fewer resources. 4
Please complete the form to gain access to this content