5 Application Security Standards You Should Know

It shouldn’t be surprising that application security has become more important over the last few years. As part of the move to the cloud, applications have become the foundation of business operations. Today, more companies use more applications to do more things than ever before. SaaS applications transmit, store, and process large amounts of sensitive data — from personally identifiable information (PII) to intellectual property.

A July 2021 report from F5 Labs gives insight into how malicious actors use vulnerabilities in applications as part of their attacks and the impact it has on businesses, noting:

Application Security (AppSec) is now fundamental to ensuring continued business stability. While security is never the same as compliance, the five application security standards you should know give you a minimum set of baselines for putting best practices into place.

OWASP Application Security Verification Standard (ASVS)

The Open Web Application Security Project (OWASP) may be the one of the most respected standards in the developer community. The nonprofit foundation is a community-led, open-source resource focusing on:

In October 2021, OWASP updated the ASVS which provides a basis for designing, building, and testing technical application security controls. The ASVS establishes three verification levels:

The ASVS lists 14 controls:

Additionally, the ASVS notes it can be applied to the following use cases:

National Institute of Technologies (NIST) Special Publication (SP) 800–218 (DRAFT)

NIST is the US federal agency tasked with setting out best practices governing the public sector. Released for public comment on September 30, 2021, the NIST 800–218 (DRAFT) “Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities” outlines 19 practices organized into the following four categories:

The 19 practices are accompanied by tasks that can achieve compliance. These practices are:

International Organization for Standardization (ISO) 27034

ISO is the international industry association that sets standards across multiple industries, including technology. ISO 27034 establishes the Application Normative Framework (ANF) and Application Security Management Process that offer controls and processes for the secure software development lifecycle (SSDLC).

The ANF outlines the following 10 components:

Center for Internet Security (CIS) Control 16: Application Software Security

CIS is a community-driven nonprofit that sets best practices for securing IT systems and data. While OWASP focuses only on applications, CIS incorporates application security into its set of 18 overarching security controls.

Under Control 16 “Application Software Security,” the 14 controls are:

Payment Card Industry (PCI) Payment Application Data Security Standard (PA-DSS)

For any applications handling payment card information, PA-DSS guides the secure development practices. PCI is the standards organization that manages payment card security under the PCI Data Security Standard (PCI DSS). The PCI can levy fines up to $100,000 per month for compliance violations.

PA-DSS outlines 14 compliance requirements:

Under “Requirement 5: Develop secure payment applications,” PA-DSS goes into further detail for developers outlining 6 primary requirements with multiple sub-requirements within them, including:

Complying with Application Security Standards

Across the five application security standards, many of the best practices and controls overlap. For example, mitigating the risk of an injection attack, engaging in code reviews, and ensuring developers have secure code training are fundamental steps to all compliance mandates. Often, a team may need to map their processes to multiple standards, like NIST and PA-DSS if they are developing software that will be used to collect payments and might be used in the public sector.

With ShiftLeft, AppSec teams have all the tools they need to secure applications and meet compliance requirements. ShiftLeft enables DevSecOps teams to build security testing directly into their workflows for continuous application security monitoring during the development phase. They can supplement these capabilities with ShiftLeft Education by assigning appropriate training to the right team, providing reporting capabilities, and aligning certifications to compliance requirements. ShiftLeft CORE provides the compliance reports that leadership, partners, and auditors need. ShiftLeft CORE is the only code analysis platform to provide a software bill of materials (SBoM) that uniquely accounts for the specific attackability of each open source package used by the app. Unless attackability is determined, the security risk of your application is artificially inflated by vulnerabilities in open source libraries that are impossible for outsiders to reach given the architecture of your application.