Reducing security debt

MicroStockHub/Getty Images

Federal agencies must take measures to minimize the introduction and accumulation of security flaws in their software

To provide critical services and information to citizens, federal agencies need secure and reliable software that manages everything from tax returns to veterans’ health records to government benefit programs. 

A string of cyber intrusions and significant software vulnerabilities over the last three years have threatened the delivery of government services to the public. Software vulnerabilities not only threaten the effective delivery of services but put at risk the integrity of vast amounts of personal information and business data that is managed by the government and private sector. 

With the cost of a data breach averaging $4.35 million—and some reports expect that number to surpass $5 million per incident in 2023—agencies must take measures to minimize the introduction and accumulation of security flaws in their software. Remediation efforts should begin early because an application is likely to have accumulated flaws from the moment it goes into production and these increase over the course of deployment. 

In fact, there is a 90% chance an application will contain at least one flaw by the 10-year mark, according to Veracode’s State of Software Security 2023 Report. The report found that flaw build-up over time is such that nearly 32% of applications are found to have flaws when they first move into production and by the time they have been in production for five years, nearly 70% contain at least one security flaw—and usually many more. 

Finding and fixing flaws 

Scanning frequently using a variety of tools helps agencies find and fix flaws and vulnerabilities that may have been introduced or built up over time. Additionally, federal agencies must automate security scans and invest in developer security training. Training will help developers better understand how to code securely, thereby avoiding the introduction of flaws altogether. 

Moreover, a comprehensive software security program and appropriate tools must be integrated early into the software development lifecycle, incorporating change management, resource allocation, and organizational controls to mitigate risks. 

Scan cadence, automating the initiation of scans and developer security training are beneficial for reducing the probability that flaws will be introduced over the lifetime of an app. Implementing a comprehensive software security program across an organization allows leadership to learn whether specific flaws occur frequently across teams and whether specific teams need more training, allowing for the development of effective programs. For a quicker return on the time investment, DevSecOps teams should consider targeting the top flaws and common weaknesses for the languages in use in their agencies. 

To figure out which flaws should take precedence on a remediation “to-do” list, the security team should consider the severity of the defect, the criticality of the application, and how easy it would be to exploit the flaw. If the development and security teams determine which flaws pose real and immediate risk, they can create an application security policy to stop deployment of an app whenever a flaw is introduced in those categories.  

For example, an app security scan uncovering a SQL injection flaw can “break the build,” forcing the developer to fix the flaw prior to pushing updates to production. An injection flaw can allow an attacker to relay malicious code through an application to another internal system, allowing an attacker to compromise that system.  

Open source, SBOMs and SCA 

Meanwhile, with the recent focus on the Software Bill of Materials , now is the time to examine factors that can introduce risk in the world of open-source software. It is estimated that up to 70% of the code that makes up the modern application is open source. The White House’s Executive Order on Improving the Nation’s Cybersecurity mandates any company selling software to federal agencies to provide a complete SBOM, which is a comprehensive list of the software components that comprise their applications. 

Developers today build their applications using libraries completely outside their control. This process establishes dependencies for basic functions that an application may need. Some of these dependencies then introduce further dependencies, which can open the door to even more risks. 

An SBOM does not necessarily directly inform developers and security teams about vulnerabilities in their components. However, they can use a software composition analysis (SCA) tool to cross-reference those components with known vulnerabilities and license risks, determine direct and indirect dependencies, and offer remediation guidance. 

Strengthening application security 

The choices DevSecOps teams make early in the software development lifecycle can measurably improve their organization’s security posture in the long run. In any given month, there is a 27% chance that new flaws will be introduced in an application, according to the State of Software Security 2023 report. Frequent application scanning, diversified methods of testing, and hands-on developer education and training can help reduce both the probability and volume of flaw introduction and improve agencies’ application security programs. 

 Chris Eng is chief research officer at Veracode.

NEXT STORY: The long-time civil servant on the front lines of the default battle

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.