Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

How to assess your organization’s application security

By Robert Deane
software developer

Image from Pixabay

August 4, 2022

It is abundantly clear to almost everyone responsible for organizational application security that there is no widely accepted approach for assessing the security of the wide portfolio of applications they are charged to manage and maintain.

Part of the challenge lies within the origin of the application code and its residency — internally developed, hosted in-house or third-party software, cloud-based applications (for example). While security engineers may be able to readily evaluate the security controls in place for internally developed software that is hosted in the company’s datacenter, gaining visibility into the security of code that resides outside of network boundaries may be a much more difficult endeavor.

Security leaders are often left with conducting third-party risk assessments that are less reliable, lack depth and rely on vendor attestations. Let’s concentrate on the applications that can be actively assessed by those individuals in our own security organizations.

Leveraging frameworks to inform software security strategy

There is no shortage of frameworks that may be used to formulate and implement a software security strategy that can be customized to address the specific risks facing an organization.

Regardless of the approach taken, understanding the maturity of the application security program will guide security professionals in taking the necessary steps required to enhance the technical, administrative and physical security controls in areas where the largest gaps exist.

The judicious use of application security metrics

Once security professionals have applied the learnings that have resulted from assessing the maturity of the company’s application security program, it is critical that they monitor the effectiveness of these newly designed and implemented security controls. The only reasonable way to do this is to create security metrics that make sense for the organization and its risk tolerance. By thoughtfully developing application security metrics that are both easy to collect and actionable, it is much more likely that the security function will be able to reduce the overall security risk profile for any given application.

The number of metrics that may be applied to an organization’s application security program are endless, but a few high-level ones that may be used to track progress and compliance to help avoid breaches, fines and lawsuits could be:

  • Percentage of applications that are part of the organization’s secure development lifecycle
  • Time required to remediate vulnerabilities
  • Flaw creation rate
  • Number of applications that are covered by automated security testing
  • Number of applications, code libraries and open-source components that are blocked against developer use

These types of measurements help security teams understand the strengths and weaknesses of the organization’s software development process, security operations and coding practices. Ultimately, metrics allow an organization to measure successes and failures of past and current security investments and provide quantifiable data to support the allocation of future capital and operational investments.

Why assessing application security is so important

A rigorous assessment of the organization’s application security and supporting program will enable the identification of potential threats before they have an impact to the operation. Given that today’s software-driven businesses can be so severely impacted by the increasing frequency of application exploits, it is critical to address application security in a meaningful way. Without understanding the security posture of enterprise applications, it is impossible to defend the organization against targeted attacks in the future.

KEYWORDS: application security cyber security leadership data security security metrics third-party risk vulnerability assessment

Share This Story

Robert deane

Robert Deane is Director of Advisory at Security Compass Advisory. He is a forward-looking, innovative application security expert with over 20 years of experience serving clients in the Financial Services, Healthcare and Manufacturing industries. His passions include applied cryptography, cloud computing and secure application design. Prior to joining Security Compass Advisory, Deane worked in a series of technical and leadership roles where he has built high-performing teams that solve complex problems for his clients. Robert has a B.A. from the University of Massachusetts at Amherst and MBA from Fordham University in NYC.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing