Finding Flaws In Old Application Code - InformationWeek
Software // Enterprise Applications
09:06 AM

Finding Flaws In Old Application Code

Two risk-management and auditing service providers next week will unveil a framework to help customers deal with vulnerabilities in old application source code.

Companies that have installed the latest security systems and procedures to protect their networks are often surprised to discover they still have vulnerabilities -- the applications themselves. Many applications that companies use every day were written before the Internet became the main means of communications and a carrier of security threats, so they weren't designed with security in mind. That's why many of the new security threats are designed to attack legacy application source code.

Two risk-management and auditing service providers next week will unveil a framework to help customers deal with source code problem. A report called Software Security Assurance -- A Framework For Software Vulnerability And Audit will be available for downloading here . It was developed by CHL Global Associates Inc. and Ounce Labs Inc., which have 30 years of experience in security and the automated auditing of software coding and design errors.

The framework outlines multiple detailed audit checklists that customers can use to find problems in application source code. It also spells out how responsibilities should be allocated among business managers and security administrators, and encourages companies to establish security metrics, trend reporting, and documentation of controls.

Charles Le Grand, founder and CEO at CHL Global, has worked with the government on auditing, governance, and risk management for decades. He's working with about 60 software auditors and says they don't have the tools to measure vulnerabilities in old code. "It's time companies change the paradigm to protect customers, shareholders, and business partners," he says.

Ounce Labs did the research and development for Le Grand's framework and it has a tool that could help with source code vulnerability. "At least 90% of all source code is legacy-based and its vulnerability is beyond the reach of most app developers," says Jack Danahy, president and CEO at Ounce Labs. "Companies should follow best practices from the audit lists, use an audit standard to find vulnerabilities, and if the code can't be fixed, wrap the legacy service into a new app."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll