Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

Vulnerability management for an appsec world

By Rickard Carlsson
phone open to apps on home screen

Image via Unsplash

October 13, 2023

Applications are where business happens these days, with enterprises increasingly deploying apps and services in the cloud to keep pace with the digital economy. However, current vulnerability management techniques don’t cover the technologies used in modern applications, which often leads to vulnerabilities going unnoticed and unpatched.

Applications have become the top cyberattack vector, surpassing email in 2021, and now account for about 70% of all security incidents, according to Verizon’s 2022 Data Breach Investigations Report. Yet AppSec vulnerabilities appear only sporadically on the top common vulnerability and exposure (CVE) lists. The reason is that AppSec vulnerabilities mostly result from issues that CVE lists don’t cover, such as misconfigurations, combinations of various tools, or developer mistakes.

When CVEs don’t cover the bases

The CVE list is a standardized catalog that identifies and defines vulnerabilities that could result in a denial of service (DoS) attack or even allow an attacker to gain access to a system. The CVE creates a specific record for each vulnerability discovered.

The problem, however, is that the vulnerabilities being generated in modern applications aren’t known. The fast development and deployment of DevOps, which keeps businesses and other organizations competitive in ever-changing cloud environments, requires security teams to rehtink how they detect these vulnerabilities, allocate resources and remediate risks. Discovering vulnerabilities before going into production can be a time-consuming process and often beyond the capacity of security teams. This is due to the complexity of modern applications; these systems consist of multiple components and services that interact with each other, making it challenging to identify vulnerabilities that may arise from the interaction of different parts. 

As a result, many of the vulnerabilities found in modern applications never show up on a CVE list. And without a catalog, prioritizing those vulnerabilities to identify the most serious potential threats becomes difficult, to say the least.

CVSS asn’t made for appsec

The established method for prioritizing vulnerabilities on a CVE list is the CVSS, which gives each vulnerability a score on a scale of one to 10, which reflects how easily a vulnerability can be exploited and how potentially damaging an exploit could be.

But as useful as CVSS has been for prioritizing coding errors in operating systems and other areas, it lacks the granular separation of attacks to be useful for application security.

Nevertheless, security teams that find themselves unable to keep up with a growing number of vulnerabilities have turned to CVSS for a lack of anything better. The teams do not have another rating system available. Because CVSS isn’t designed for application security, its rating system has resulted in inaccuracies. Teams have ended up spending a lot of time fixing vulnerabilities that posed little risk to the enterprise — while missing vulnerabilities that presented a high level of risk and should have been prioritized. Additionally, third-party libraries that could be part of an application's code may have vulnerabilities but lack an attack path. This can lead security teams to waste time attempting to fix them, as they aim for a state of zero vulnerabilities.

Patching doesn’t keep pace

Finding and prioritizing vulnerabilities can be difficult enough with AppSec, but the next step often leaves those weaknesses exposed. Even in cases where security flaws are considered severe, patching them can be a slow process. Trustwave’s 2021 Spiderlabs Telemetry Report, for example, found that half of exposed servers remained unpatched for weeks or months after an update had been released.

As with CVE and CVSS, accepted patching processes don’t really meet the requirements of AppSec. Under the Payment Card Industry Data Security Standard (PCI DSS), for example, an organization can take a month to patch a critical vulnerability and still be compliant. That large window can create enormous risks.

The old guard stands in the way

The vulnerability management sector is resistant to change, dominated by a handful of established players that have stuck with the same way of doing things rather than innovating. Likewise, standard ISMS frameworks have remained static, held back by the compliance sector’s own slow pace. Little has changed in the last decade, despite rapid transformation in application development and the threat landscape.

Security teams working with a standardized, widely accepted approach to vulnerability management have limited options and are not able to develop customized policies that fit their company’s business. Policy violations often equate to vulnerabilities, so, rather than reactively chasing down vulnerabilities after they’ve appeared, proactively resolving policy violations is a more effective approach.

Enterprises should shift left — and right

An approach that has become increasingly common to address AppSec concerns is shifting left. By building security into the development process from the start, DevSecOps teams can catch vulnerabilities early, testing for flaws and correcting them in the staging phase. Fixing those flaws before apps are put into production has proved beneficial and certainly is an improvement over traditional methods of building code and running it past the security team at the last minute.

However, shifting left is not a panacea. It doesn’t solve AppSec problems on its own because it can’t. Production environments are different from staging environments, and the fact is that not all vulnerabilities will be found during staging. Some vulnerabilities with the greatest risk may not show up until the applications get into production, so relying on shift left alone to catch all vulnerabilities is impractical and costly.

The alternative is to shift right. Continuously testing in the production environment, with real payloads — taking an attacker’s view — allows teams to find vulnerabilities quickly and identify which of them pose the greatest risk.

They just need to be sure not to fall back into old habits. Testing in the production environment traditionally has relied on vulnerability management and applying patches. But the overreliance on that approach and CVEs means it will miss most vulnerabilities that result from DevOps practices. Testing needs to be tailored to the environment.

Ideally, organizations should shift left and right, continuously testing in both the development and production environments. And they should do it without relying on outdated vulnerability management practices that aren’t made for DevOps.

Vulnerability management still has an important role, especially in ensuring that organizations meet compliance requirements. But relying on CVEs as guides to AppSec overlooks too many flaws and will leave organizations vulnerable. Continuous testing and remediation, both during development and in production, give organizations a much better chance of protecting the modern tech stack.

KEYWORDS: application security data security DevOps vulnerability assessment vulnerability management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rickard Carlsson is CEO and Co-Founder of Detectify.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Feature-img

    Cyber-physical security in an interconnected world

    See More
  • cyber remote work

    Connected and protected: Identity management for enterprises in an era of zero trust

    See More
  • Several laptops open on a wooden table with cups and headphones

    Strategies for building an effective threat management team

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing