<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CI/CD - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/ci-cd-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/ci-cd-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 04 Mar 2025 17:42:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>CI/CD - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/ci-cd-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>From Vulnerability Management to ASPM: Evolution or Revolution? </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/03/from-vulnerability-management-to-aspm-evolution-or-revolution/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/03/from-vulnerability-management-to-aspm-evolution-or-revolution/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre GUY]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 13:00:00 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[AppSec]]></category>
		<category><![CDATA[ASPM]]></category>
		<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25482</guid>

					<description><![CDATA[<p>Over the past few years, companies have been rapidly adopting security tools to protect their applications across the development lifecycle, leveraging DevSecOps scanners such as SAST, DAST, SCA, and scanners for containers, Infrastructure-as-Code, and secrets. Progressively, the goal has shifted...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/from-vulnerability-management-to-aspm-evolution-or-revolution/">From Vulnerability Management to ASPM: Evolution or Revolution? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Over the past few years, companies have been rapidly adopting security tools to protect their applications across the development lifecycle, leveraging </span><b><span data-contrast="none">DevSecOps</span></b> <span data-contrast="auto">scanners such as SAST, DAST, SCA, and scanners for containers, Infrastructure-as-Code, and secrets. Progressively, the goal has shifted from simple vulnerability detection to seamless integration and automation within CI/CD pipelines.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This is where </span><b><span data-contrast="none">Application Security Posture Management</span></b> <span data-contrast="auto">(ASPM) steps in. Managing numerous applications and their associated security tools while maintaining comprehensive visibility is increasingly challenging. ASPM provides a logical response to the growing </span><b><span data-contrast="none">complexity</span></b> <span data-contrast="auto">of CI/CD toolchains, aiming to unify AppSec management under </span><b><span data-contrast="none">a single platform.</span></b> <span data-contrast="auto">It enables security teams to clearly view and assess the security posture of all their application perimeters.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The goal of this article is to briefly go over ASPM’s capabilities, and to confirm whether it is simply another take on vulnerability management or if the paradigm has shifted towards a new unique type of security tool. We will also debunk key factors that businesses should consider when selecting the right ASPM solution.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">What is ASPM?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">ASPM, or Application Security Posture Management, is one of the latest </span><b><span data-contrast="none">buzzwords</span></b> <span data-contrast="auto">in AppSec. Popularized after Gartner’s May 2023 </span><a href="https://www.gartner.com/en/documents/4326999"><span data-contrast="none">insight document</span></a><span data-contrast="auto">, ASPM refers to technology that consolidates all application security tools into a single interface. Over the past year, several startups and established AppSec vendors have rebranded or launched proprietary solutions to acquire part of this emerging market.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The </span><b><span data-contrast="none">definition</span></b> <span data-contrast="auto">provided by Gartner is as follows: “</span><i><span data-contrast="auto">Application security posture management (ASPM) offerings continuously manage application risks through detection, correlation, and prioritization of security issues from across the software life cycle, from development to deployment. They act as a management and orchestration layer for security tools, enabling controls and the enforcement of security policies.”</span></i><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img fetchpriority="high" decoding="async" class="aligncenter wp-image-25472 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/1-Recapitulatif-des-caracteristiques-dASPM--e1741098683288.jpg" alt="Récapitulatif des caractéristiques d’ASPM" width="1222" height="541" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/1-Recapitulatif-des-caracteristiques-dASPM--e1741098683288.jpg 1222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/1-Recapitulatif-des-caracteristiques-dASPM--e1741098683288-431x191.jpg 431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/1-Recapitulatif-des-caracteristiques-dASPM--e1741098683288-71x31.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/1-Recapitulatif-des-caracteristiques-dASPM--e1741098683288-768x340.jpg 768w" sizes="(max-width: 1222px) 100vw, 1222px" /></span></p>
<p style="text-align: center;"><b><i><span data-contrast="auto">Fig 1</span></i></b><i><span data-contrast="auto"> &#8211; Overview of ASPM features</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The primary value of ASPM lies in delivering scalable security from code-to-cloud. ASPM enhances visibility at every stage by reducing</span><b><span data-contrast="none"> false positives</span></b><span data-contrast="auto">, minimizing </span><b><span data-contrast="none">alert fatigue</span></b><span data-contrast="auto">, and providing a </span><b><span data-contrast="none">single source of truth</span></b> <span data-contrast="auto">for vulnerability ownership. This is key for organizations overwhelmed by thousands of alerts and struggling to allocate resources for remediation effectively.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">How is ASPM unique compared to existing solutions?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Traditional </span><b><span data-contrast="none">vulnerability management</span></b> <span data-contrast="auto">tools aggregate and prioritize security issues detected by scanners. However, they are not exclusive to application security and often span broader IT perimeters in the information system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">If you are familiar with the topic, </span><b><span data-contrast="none">Application Security Orchestration &amp; Correlation (ASOC)</span></b> <span data-contrast="auto">originally marked a shift by focusing specifically on managing application security issues. ASOC offered DevSecOps teams an interface to orchestrate tools and streamline remediation workflows.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">ASPM on the other hand can be seen as an </span><b><span data-contrast="none">evolution</span></b> <span data-contrast="auto">of ASOC, extending its scope from simple code security to </span><b><span data-contrast="none">code-to-cloud.</span></b> <span data-contrast="auto">This includes analyzing not just application code but also the infrastructure and resources used in development and deployment. For example, ASPM can assess configurations, container images, and Infrastructure-as-Code (IaC) modules like Terraform scripts.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Other key differences between ASPM and ASOC include:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol style="text-align: justify;">
<li><b><span data-contrast="none">Enhanced Prioritization</span></b><span data-contrast="auto">: ASPM prioritizes business-critical risks over simple CVSS-based issues, often leveraging advanced algorithms for triaging.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="none">Compliance Support</span></b><span data-contrast="auto">: ASPM allows organizations to triage vulnerabilities based on frameworks such as OWASP, ISO, and SOC2, helping organizations achieve compliance.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="none">Policy-as-Code</span></b><span data-contrast="auto">: ASPM enables organizations to define policies, such as blocking deployments if risk scores exceed thresholds or if code reviews are incomplete.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Decisive factors in choosing a provider </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">If used right, ASPM can effectively help teams optimize their workflows and remediate security issues faster. Nevertheless, even if all ASPM providers have their own strengths and uniqueness, selecting the right solution is essential since not all of them will suit every organization. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img decoding="async" class="aligncenter wp-image-25474 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/2-Panel-non-exhaustif-de-fournisseurs-dASPM-e1741098414154.jpg" alt="Panel non exhaustif de fournisseurs d’ASPM" width="1028" height="462" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/2-Panel-non-exhaustif-de-fournisseurs-dASPM-e1741098414154.jpg 1028w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/2-Panel-non-exhaustif-de-fournisseurs-dASPM-e1741098414154-425x191.jpg 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/2-Panel-non-exhaustif-de-fournisseurs-dASPM-e1741098414154-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/2-Panel-non-exhaustif-de-fournisseurs-dASPM-e1741098414154-768x345.jpg 768w" sizes="(max-width: 1028px) 100vw, 1028px" /></span></p>
<p style="text-align: center;"><b><i><span data-contrast="auto">Fig 2</span></i></b><i><span data-contrast="auto"> – Non-exhaustive panel of ASPM providers</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Each context brings its own </span><b><span data-contrast="none">unique decisive factors</span></b> <span data-contrast="auto">when choosing the right ASPM, some of which include:</span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">Can this solution integrate the tools I already have? How close to a plug-and-play experience will it be?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">How far can I integrate this ASPM in my CI/CD? How far can it automate remediation workflows?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Who are the targeted end users? (Security team, Security champion, Devs &amp; Ops)</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Is the ASPM leveraging a custom algorithm for prioritization or rather CVSS, EPSS?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Is the interface aesthetically pleasing and easy to use? Can I customize it?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">How does the provider handle my data?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Is the security of the ASPM itself up to my standards? Does it support SSO, MFA, RBAC?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">What is the support level provided by the editor?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Are the proposed subscription plans adapted to my organization’s needs?</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">What is concretely meant by the advertised use of Artificial Intelligence in the solution?</span><span data-ccp-props="{}"> </span></li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Some things to look out for</span></b><span data-ccp-props="{}"> </span></h2>
<h3 style="text-align: justify;"><b><span data-contrast="auto">DevSecOps maturity</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">ASPM can therefore be defined as a useful yet somewhat “niche” solution for application security. While it can function as a relatively effective plug-and-play tool, ASPM still requires </span><b><span data-contrast="none">integration</span></b> <span data-contrast="auto">work and </span><b><span data-contrast="none">fine-tuning</span></b> <span data-contrast="auto">by security teams to maximize its potential. Organizations that lack a robust security stack or are still in the early stages of building a DevSecOps pipeline may benefit less from ASPM. For such organizations, focusing on foundational tools and processes before adopting ASPM might be a more practical approach.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Managing false positives and false negatives</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">One of ASPM’s promises is to reduce</span><b><span data-contrast="none"> false positives</span></b><span data-contrast="auto">, which is a common benefit of vulnerability management. In practice, however, while noise is minimized, it is rarely entirely eliminated. Security teams must still manually triage and address vulnerabilities that the system cannot confidently classify as false positives.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Another critical concern is the potential for </span><b><span data-contrast="none">false negatives</span></b><span data-contrast="auto">. Some vendors claim their tools </span><b><span data-contrast="none">“reduce vulnerabilities by 99%”</span></b><span data-contrast="auto">, though, unless the risk-scoring algorithms are fully transparent, there is a risk that genuine security issues might be overlooked. When algorithms classify certain vulnerabilities as insignificant without proper justification, this creates blind spots that could expose the organization to unaddressed risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Accordance with teams’ needs </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Before committing to ASPM, it is necessary to ensure that the solution fits the organization’s specific requirements. Running a </span><b><span data-contrast="none">proof-of-concept</span></b> <span data-contrast="auto">(PoC) on a small scale— testing the platform with diverse teams operating under different dynamics— can provide valuable insights into its adaptability and usability.</span> <br /><span data-contrast="auto">Most ASPM solutions are offered as </span><b><span data-contrast="none">SaaS</span></b> <span data-contrast="auto">platforms, simplifying deployment for PoC and making it easier to evaluate the tool without significant initial investment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Security</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Given that ASPM often has access to sensitive data, such as source code and real configurations, organizations must thoroughly verify that the solution adheres to their security standards. Failure to do so could turn ASPM into a </span><b><span data-contrast="none">single point of failure</span></b> <span data-contrast="auto">within the security stack.</span><span data-ccp-props="{&quot;335559731&quot;:708}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">An alternate definition of ASPM?</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Vulnerability managers and ASOC in their essence </span><b><span data-contrast="none">do not aim to incorporate built-in scanners</span></b><span data-contrast="auto">, but simply </span><b><span data-contrast="none">to aggregate</span></b> <span data-contrast="auto">findings from other tools. Similarly, the </span><b><span data-contrast="none">core value </span></b><span data-contrast="auto">of ASPM as it was defined by Gartner is to manage risk in Code-to-Cloud settings, without meddling in the scanning part, which is left to AppSec and CSPM tools.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, almost two years after Gartner&#8217;s study was released, ASPM has steered towards a direction that somewhat diverges from their initial vision. ASPM providers have started integrating </span><b><span data-contrast="none">proprietary scanners</span></b> <span data-contrast="auto">inside of their solutions so that their customers would not have to acquire third-party ones. A </span><a href="https://pulse.latio.tech/p/defining-aspm"><span data-contrast="none">great article</span></a><span data-contrast="auto"> from James Berthoty rightfully argues that since Gartner’s definition of ASPM can simply be deemed an evolution of ASOC, there’s no reason to call it anything other than ASOC.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Arguably, the only legitimate reason to evolve from ASOC to ASPM would be a new type of tool aiming to conquer a need of the AppSec market which has not been fulfilled yet: an </span><b><span data-contrast="none">all-in-one</span></b> <span data-contrast="auto">platform for application security. By simply connecting your source code and your environments, this platform would scan everything, aggregate the findings, and simply output the most critical issues and how to remediate them. This could be especially relevant for organizations with no prior security stack looking for a full AppSec solution, whereas those who want to keep their current toolchain may opt for an aggregator version of ASPM instead.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img decoding="async" class="aligncenter wp-image-25476 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/3-Comment-definir-lASPM-ideal-e1741094896951.jpg" alt="Comment définir l’ASPM idéal" width="1280" height="720" /></span></p>
<p style="text-align: center;"><b><i><span data-contrast="auto">Fig 3</span></i></b><i><span data-contrast="auto"> – Defining the ideal ASPM</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">To conclude</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Gartner originally predicted that by 2026, </span><b><span data-contrast="none">over 40%</span></b><span data-contrast="auto"> of organizations developing proprietary applications would use ASPM to manage risks in their applications. While this prediction might be slightly ambitious, the need for better application security tooling and a centralized security management platform is also rising quickly. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To realize its full potential, ASPM must be part of a broader </span><b><span data-contrast="none">DevSecOps strategy</span></b><span data-contrast="auto">. Organizations need to establish the right processes, governance, and CI/CD foundations to fully benefit from it. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/from-vulnerability-management-to-aspm-evolution-or-revolution/">From Vulnerability Management to ASPM: Evolution or Revolution? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/03/from-vulnerability-management-to-aspm-evolution-or-revolution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stay in control of your external developments</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/stay-in-control-of-your-external-developments/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/stay-in-control-of-your-external-developments/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Massoni]]></dc:creator>
		<pubDate>Fri, 03 Feb 2023 10:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[outsourcing]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19585</guid>

					<description><![CDATA[<p>How to ensure the security of your applications despite outsourcing their development?   Integrating security into projects is an important process for companies to define and integrate security aspects into products as early as possible. This avoids increasing the cost...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/stay-in-control-of-your-external-developments/">Stay in control of your external developments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<blockquote>
<p style="text-align: justify;">How to ensure the security of your applications despite outsourcing their development?</p>
</blockquote>
<p> </p>
<p style="text-align: justify;">Integrating security into projects is an important process for companies to define and integrate security aspects into products as early as possible. This avoids increasing the cost of remediation if it has not been planned and is implemented at the end of the project.</p>
<p style="text-align: justify;">In the context of developments, Agile Security and DevSecOps define the processes and tools to be put in place to integrate security as early as possible, as presented in our previous article giving examples.</p>
<p style="text-align: justify;">These methods are often defined on internal developments. However, <strong>it is often the case that companies call on external service providers to develop a particular application or functionality</strong>. In this case, it is important to ensure that these providers follow rigorous security practices and that they integrate security into their development processes to the same standards as the requester. This leads to the following question:</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">External developments: how to maintain confidence in externally developed code?  </h1>
<p style="text-align: justify;">In the remainder of this article, external code is defined as all code elements that have not been developed through an internalised CI/CD chain. For example, a freelance developer using the internal CI/CD chain or an enterprise workstation is not considered external code.</p>
<p style="text-align: justify;">In addition, we will consider two models of application delivery depending on the development model used by the provider:</p>
<ul style="text-align: justify;">
<li>delivery of the source code itself</li>
<li>delivery of the executable, i.e. the already precompiled code</li>
</ul>
<p style="text-align: justify;">It is important to note that these two application delivery models have different implications in terms of cyber security and DevSecOps.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Code delivery</h1>
<p style="text-align: justify;">In the case of code delivery, external providers hand over the code they have written, usually in the form of source files (e.g. .java files for Java code), to the company. The company can then audit, compile and deploy the code on its own servers.</p>
<p style="text-align: justify;">Code delivery has several advantages. The first advantage is flexibility: by delivering the source code, the company can easily make changes and customisations to the code. It can also integrate the code into its existing development and deployment environment (CI/CD) containing all the pre-configured security tools.</p>
<p style="text-align: justify;">The company then does not have to place its trust in the security of the provider&#8217;s CI chain over which it has no control. In addition, the company with access to the source code can also audit it and thus verify that it is secure. These audits tend to be more comprehensive as the auditor has access to much more detail about the operation of the code and can perform both static and dynamic analysis of the code.</p>
<p style="text-align: justify;">On the other hand, code delivery has some disadvantages. The company must have the skills to adapt the build and deployment stages to the production context. If these skills are not available in-house, this can lead to additional costs.  </p>
<p style="text-align: justify;">Here are some good practices to maximise confidence in the delivered code:</p>
<ul style="text-align: justify;">
<li>Share as early as possible (contract, kick-off meeting) the expected requirements on security in development, software versions, internal tooling used for deployment, confidentiality of source code, etc. Some clients require external developers to have a certain level of certification or training (for example, a level of training on Secure Code Warrior, in a certain programming language).</li>
<li>Define and contractualise commitments on the remediation processes for identified vulnerabilities after code delivery and the associated monitoring (monitoring tools, SLAs, etc.)</li>
<li>Implement a hash or signature type control on the code sent to ensure its integrity and define the methods for secure transfer of the source code with the service provider</li>
<li>Integrate the code received into the existing CI/CD chain, including the Infrastructure as Code (IaC) files</li>
<li>Carry out the functional security tests initially defined during the threat modelling: Evil User Stories and Security Stories</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Some organisations may be faced with a situation where the notion of external developers corresponds to developers from other entities within the same group. These entities may have their own CI chains but depend on the CD or CI/CD chain of the central production team.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19574 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN.png" alt="" width="929" height="313" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN.png 929w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-437x147.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-768x259.png 768w" sizes="auto, (max-width: 929px) 100vw, 929px" /></p>
<p style="text-align: justify;">In these cases, an interconnection of the different CI chains to the central CI/CD chain can be considered. This solution allows the different teams to develop with the tools that best suit them.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The level of security provided by the project CI/CD chain is ideally equivalent to that of production but this is not necessarily the case. The production CI/CD chain controls the code to be deployed.</p>
<p style="text-align: justify;">However, security control is often carried out too late in the development process. To ensure effective security in developments, it is crucial to ensure that security is integrated from the beginning of the development cycle (shift-left). To address this, it is recommended to provide self-service security tools for project teams to identify vulnerabilities early in their development using the appropriate target tools.</p>
<p style="text-align: justify;">Otherwise, the security tools in the production CI/CD chain will ensure compliance with the group&#8217;s rules without slowing down the production release if automated security controls have been put in place within the project chain.</p>
<p style="text-align: justify;">This solution also allows production to ensure the use of images (systems, docker, etc.) or artefacts (libraries) validated by the company.</p>
<p style="text-align: justify;">These interconnections between the different pipelines can, for example, clone the branch to be deployed by the product team in order to push them into the CD chain. However, the production teams must have the appropriate rights. Technically, the model for managing the rights granted (ideally temporarily) must meet both the need to facilitate execution and the need for rights provisioning (manual vs. automatic), while limiting access to all branches or projects in order to respect the principle of least privilege.</p>
<p style="text-align: justify;">Most of the good practices mentioned above also apply to reduce the time to production.</p>
<p style="text-align: justify;">Although the methods described above appear to be the most effective for gaining control over applications developed by third parties, companies sometimes find themselves receiving executables without access to the source code. This may be due to licensing restrictions, for example. In this case, some of the good practices outlined above do not apply, and it is necessary to rethink how to integrate changes into production so as not to neglect certain security aspects.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Executable delivery</h1>
<p style="text-align: justify;">In the case of executable delivery, external providers hand over an executable file (e.g., an .exe file for Windows servers) that can be directly executed by the company without compilation. This delivery method is often used for commercial software that still requires some configuration adjustments.</p>
<p style="text-align: justify;">In this context, the integration in the deployment chain is much more limited and only a few classical CD steps can be performed without the security steps of the CI chain being verified:</p>
<ul style="text-align: justify;">
<li>Performing an artefact scan</li>
<li>Performing a DAST scan to detect the most common vulnerabilities</li>
<li>Performing penetration tests</li>
</ul>
<p style="text-align: justify;">Reports from the security tools of the development provider&#8217;s chain can also be requested. This must be included in the service contract, along with the security requirements for the level of security of the code.</p>
<p style="text-align: justify;">Finally, a signature of the code to ensure its integrity is necessary at the time of the exchange and the executable. For this purpose, it is better to use signatures via certificates rather than hash prints, since the latter make it possible to verify the origin (non-repudiation) in addition to the integrity of the executable.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In conclusion, it is important for companies to ensure the quality and security of the code delivered by external providers, especially when the latter are developing code on external CI chains. There are several ways to convince yourself of the security of the delivered code:</p>
<ul style="text-align: justify;">
<li>Clear and precise contractual clauses can help define the expectations and responsibilities of each party with regard to the quality and security of the code.</li>
<li>Sharing specifications and security expectations with external providers can also help ensure that the delivered code meets the company&#8217;s requirements.</li>
<li>Integration with internal development chain tools can facilitate verification of code quality and security, as well as the implementation of automated testing. These integrations raise both technical and process challenges that must be anticipated to facilitate the deployment of external developments.</li>
</ul>
<p style="text-align: justify;">By implementing these different approaches, companies can increase their confidence in the code delivered by external providers and ensure the security of their application.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/stay-in-control-of-your-external-developments/">Stay in control of your external developments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/stay-in-control-of-your-external-developments/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
