www.stackhawk.com
Open in
urlscan Pro
65.9.66.109
Public Scan
URL:
https://www.stackhawk.com/blog/why-dast-should-be-your-first-application-security-priority/
Submission: On March 30 via api from US — Scanned from DE
Submission: On March 30 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
go to homepage Why StackHawkProduct Solutions DocsPricing Resources Sign InCreate Account WHY DAST SHOULD BE YOUR FIRST APPLICATION SECURITY PRIORITY Rebecca Warren|October 28, 2021 StackHawk is DAST (dynamic application security testing) reimagined for today’s engineering teams, with features that alert engineers of potential vulnerabilities on the pull request and enable them to push fixes quickly. Whether you are an engineering team looking to roll out application security testing or a seasoned application security expert looking to improve your test suite, learn why we love DAST here at StackHawk. * Why We ❤️ DAST * Where DAST Has Historically Fallen Short * How StackHawk Is Different * Why Teams Like SAST * DAST vs SAST * Why Teams Like SCA * DAST vs SCA * Get Going with DAST There are three standard tools in a security leader’s arsenal for tackling application security testing – Dynamic Application Security Testing (DAST), Static Application Security Testing (SAST), and Software Composition Analysis (SCA). One of the conversations we come across often here at StackHawk is, “Which tool should I start with?” This is true for organizations of all sizes – from those just beginning to build out their AppSec program to those working on retooling their current approach to be more developer friendly. While a comprehensive security program will have all three in place, we are big believers that DAST is the best place to start an application security journey. Ready on to see why teams can get the most out of a tool by starting with DAST. WHY WE ❤️ DAST Of the three security tooling types available, teams can see the greatest return on investment by implementing DAST. There are a few reasons for this: 1. DAST simulates how bad actors access your applications. The types of attacks that a DAST scan can find simulate a bad actor attempting to steal or manipulate sensitive data, deface a website, or plant malware on the site. If you are implementing a tool to protect yourself from external threats, DAST is the best option. 2. DAST tests the running application. Neither SAST nor SCA have the proper context of how the application being tested actually works. Because DAST is testing the running application with bad inputs to see how it behaves, users get more accurate results. 3. DAST finds vulnerabilities that your team is writing. While testing open source libraries is important, 69.1% of companies have more vulnerabilities from their own application development vs. the use of open source. This means your first consideration when it comes to security testing should be the code your team is writing with a tool like DAST, not the libraries you are using. WHERE DAST HAS HISTORICALLY FALLEN SHORT That being said, DAST has not always been a user-friendly tool. Historically it came with operational hurdles that made it a tool that frustrated both security and developers. Until recently, DAST had the following struggles: 1. Difficult to automate. DAST was typically used by penetration testers to run manual audits that could take days or weeks. Until recently there have not been good options for fitting DAST into the modern development workflow. 2. Testing the front end in prod. Because DAST was difficult to automate, that meant security teams and pen testers were testing the application in production. One of the biggest hurdles with this approach is that it only tests an app’s front end. 3. Coverage for microservices and modern apps. DAST technologies were created at a time when application architectures were much simpler. Unfortunately that means for today’s teams that are building microservices architectures with backing APIs, there is no good way to test these individual components for vulnerabilities. 4. Difficult to take action on findings. Perhaps the most frustrating part of DAST is that it only tells teams that certain vulnerabilities exist versus pointing to the exact line of code causing the vulnerability. The frustration from this issue is compounded by the first two items on this list. By the time vulnerabilities are found and shared back with developers, it may be weeks or months since they worked on the code that was tested. They have moved on and forgotten about that particular portion of the application they were working on, and as a result, the fix requires mental backtracking. HOW STACKHAWK IS DIFFERENT When we started StackHawk, we were well aware of the typical challenges of DAST. So we created a DAST tool that was easy to deploy, easy to automate in CI/CD, provided complete coverage for APIs, and had developer-friendly features that equipped engineers to fix vulnerabilities immediately. If you are hesitant to try DAST because you have been burned by other tools before, give StackHawk a try for free and see what you think. But enough about us, let's get back to the other types of tools available. WHY TEAMS LIKE SAST If you are trying to find vulnerabilities in the code your team is writing, the alternative to DAST is SAST. SAST works by analyzing an app’s source code and looking for vulnerabilities in the code as it is written. By analyzing the source code instead of the running app, users are able to get broad coverage, even if that code is difficult to execute programmatically. Additionally, a SAST scan can be done relatively quickly because the scanner is not interacting with a live app instance. Perhaps the most loved feature of SAST is that it pinpoints to the exact line of code causing the vulnerability. DAST VS SAST At StackHawk, we prefer using DAST as the foundation of an application security program over SAST. We are obviously biased, but we think the quality of results from a DAST scan are of higher quality and better protect team from vulnerabilities making it into the wild. The benefits of DAST over SAST we see the most are: 1. DAST is much less prone to false positives. If DAST finds a security bug in the application, it almost certainly exists. By producing less false positives, security teams can spend less time validating if findings actually exist, and developers can get a more focused testing experience. 2. DAST can handle complex application architectures. SAST has difficulty finding vulnerabilities when an app has multiple layers (e.g., proxies, middleware) or is composed of microservices. If we were building apps in 2004, this wouldn’t be a problem. But if your team is building modern apps, SAST may not be your best option. 3. SAST is language dependent. If you are writing an app in C++ or python, this is likely not going to be a problem for you. But, if you are writing an app in Kotlin, Rust, or any newer language, you are likely going to be short on SAST options for your shiny new app. WHY TEAMS LIKE SCA Software Composition Analysis, or SCA, is another type of security testing tool that finds vulnerabilities in open source components that your team is using. Teams like using SCA because it is quick to run and provides broad coverage. SCA is also a newer class of tool that is built to enable developers to remediate vulnerabilities before production. Most SCA tools integrate with major CI/CD providers, run a scan at the PR, and provide a summary of actionable findings to developers if the application contains any vulnerable dependencies. The tools provide guidance on how to remediate vulnerabilities (most often by updating the version being used), and developers can get back to building features. If you are working on a new project, it is really simple to update versions of open source components without breaking changes. For legacy projects, this can be much trickier, but still worth the effort. DAST VS SCA As we mentioned above, most companies have more vulnerabilities from their own application development as compared to open source components. This means your first consideration when it comes to security testing should be the code your team is writing, not the libraries you are using. DAST and SCA are not substitutes for one another. If your team is looking to prioritize a rollout between tools, our recommendation is DAST first, so that you can be sure the code your team is writing is secure. That being said, open source code is pervasive. Almost 99% of audited codebases contain some amount of open source, and the average percentage of open source in those code bases has almost doubled — from 36% in 2015 to 70% in 2019. Your work is not done after securing your own code base and SCA is a great follow-up tool to add to your pipeline. There are great benefits to using DAST and SCA together. Where DAST can find a vulnerability in a running application, SCA can help you validate that finding and pinpoint where it lives in an open source library while providing quick remediation guidance which is typically a version upgrade. You can see an example of that in action in our joint webinar with Snyk. GET GOING WITH DAST Implementing new security tooling in any organization is a big decision. It is important that you think through what types of vulnerability protection you are looking for, who will be involved in testing, and how the tool fits into existing workflows. Based on how you answer those questions you can determine if DAST is the best place to begin, which we strongly believe is the case for most teams. Teams that are implementing StackHawk in their pipelines are seeing operational gains in their security team, protecting their APIs from vulnerabilities, and reducing risk across their organizations. You can set up a StackHawk account and get scanning for free today. Teams are able to get from account sign-up to a completed scan in CI/CD in 20 minutes. So give it a go, and feel free to drop us a line if you run into any hurdles. -------------------------------------------------------------------------------- Rebecca Warren | October 28, 2021 MORE STACKHAWK Add AppSec to Your CircleCI Pipeline With the StackHawk Orb Application Security is Broken. Here is How We Intend to Fix It. Using StackHawk in GitLab Know Before You Go (Live) We use first and third party cookies to ensure that we give you the best experience on our website and in our products. If you continue to use this site we will assume that you are happy with it and we'll let corporate know. OKPrivacy policy Close GDPR Banner PRODUCT * Overview * Why StackHawk * How it Works * What it Tests * Pricing * Integrations * Sign In RESOURCES * Getting Started * Docs * Config * Run Hawkscan * Troubleshooting * Blog * ZAP Fund COMPANY * About * Team * JobsWe're Hiring * Press GET IN TOUCH * Contact Us * hello@stackhawk.com * StackHawk Inc. 1624 Market St,Ste 226 PMB 36969 Denver, CO 80202 * Follow * Visit Stackhawk's Twitter AccountVisit Stackhawk's Linkedin Company ProfileVisit Stackhawk's Facebook AccountVisit Stackhawk's Github Account -------------------------------------------------------------------------------- ©2021 StackHawk Inc., All Rights Reserved | Terms | Privacy Crafted in Colorado Learn how to automate security testing in CI/CD with StackHawk + GitHub Actions Watch the Video