Application Security Authority - Software Security Reference
Application security encompasses the practices, tools, and standards used to identify, remediate, and prevent vulnerabilities in software systems before and after deployment. This page covers the definition and regulatory scope of application security, the mechanisms by which software security controls operate, common scenarios where those controls are applied, and the decision boundaries that practitioners use to classify risk and assign remediation priority. The subject matters because insecure software is the attack surface behind the majority of documented data breaches, and federal agencies including NIST and CISA treat software security as a foundational pillar of national cyber resilience.
Definition and scope
Application security (AppSec) is the discipline of designing, building, testing, and maintaining software in ways that protect it from unauthorized access, data corruption, and functional abuse. It spans the full software development lifecycle (SDLC) — from requirements gathering through retirement — and encompasses both preventive controls (secure coding standards, threat modeling) and detective controls (static analysis, dynamic scanning, penetration testing).
NIST SP 800-218, the Secure Software Development Framework (SSDF), defines four practice groups: Prepare the Organization (PO), Protect the Software (PS), Produce Well-Secured Software (PW), and Respond to Vulnerabilities (RV). These groups provide a vocabulary referenced throughout this network and serve as an anchor for practitioners seeking compliance alignment.
The regulatory perimeter for AppSec is broad. The Office of Management and Budget (OMB) Memorandum M-22-18 requires federal agencies and their software suppliers to attest conformance with SSDF practices. The Federal Risk and Authorization Management Program (FedRAMP) mandates application-layer security reviews for cloud services used by federal customers. At the state level, the California Consumer Privacy Act (CCPA) imposes "reasonable security" obligations that courts and regulators interpret to include application-layer controls.
Scope boundaries matter. Application security is distinct from network security, endpoint security, and physical security, though overlaps exist. A software vulnerability exploited over a network is an AppSec failure, not a network-layer failure. Cybersecurity terminology and definitions on this network clarifies these distinctions across the full security taxonomy.
The Application Security Authority Reference Site is the primary subject-matter hub covering AppSec practice areas in depth, including OWASP alignment, SAST/DAST methodology, and supply chain risk. The Code Compliance Authority extends that coverage into compliance-driven secure coding mandates, addressing how regulatory obligations translate into line-level development requirements.
How it works
Application security operates through a set of structured phases that run parallel to or integrated within the SDLC. The phases below reflect the structure used by OWASP's Software Assurance Maturity Model (SAMM) and NIST SSDF.
-
Threat Modeling — Before code is written, architects identify assets, trust boundaries, data flows, and adversary objectives. STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) is a widely applied classification framework developed by Microsoft and documented in NIST SP 800-154.
-
Secure Design Review — Architecture diagrams and component selections are evaluated against established secure design principles: least privilege, defense in depth, fail-safe defaults, and minimizing attack surface.
-
Static Application Security Testing (SAST) — Source code is analyzed without execution. Tools examine control flow, data flow, and taint paths to flag injection risks, hardcoded credentials, and insecure cryptographic usage. SAST runs inside CI/CD pipelines and produces findings categorized by CWE (Common Weakness Enumeration).
-
Dynamic Application Security Testing (DAST) — The running application is probed from the outside, simulating an unauthenticated or authenticated attacker. DAST identifies runtime issues that static analysis cannot detect: session fixation, insecure redirects, and server misconfiguration.
-
Software Composition Analysis (SCA) — Third-party and open-source components are inventoried against the NVD (National Vulnerability Database) and compared against a Software Bill of Materials (SBOM). OMB M-22-18 explicitly requires SBOM production for software supplied to federal agencies.
-
Penetration Testing — Human testers exercise the application with adversarial intent, combining automated tool output with manual chaining of low-severity findings into exploitable attack paths.
-
Remediation and Verification — Findings are triaged by CVSS score, assigned to development owners, patched, and re-tested. Closure verification closes the feedback loop.
The Cyber Compliance Authority documents how these phases map to regulatory audit requirements, while Penetration Testing Authority provides reference detail on authorized adversarial testing methodology, scope agreements, and rules of engagement.
The broader operational context for AppSec within enterprise security programs is covered in how cybersecurity works, which explains how application controls integrate with network, identity, and endpoint controls.
Common scenarios
Application security controls are applied across four primary deployment contexts, each with distinct risk profiles and tooling requirements.
Web Application Security
Web applications face the attack classes catalogued in the OWASP Top 10, a consensus-driven list last updated in 2021 that ranks injection, broken access control, and cryptographic failures as the three most critical risk categories. Broken access control moved to the number one position in the 2021 edition, displacing injection after holding the top position for over a decade.
California Security Authority covers state-specific compliance obligations affecting web application operators in California, including CCPA enforcement patterns and California's data breach notification statute under Civil Code § 1798.82. New York Security Authority addresses analogous requirements under the SHIELD Act and New York Department of Financial Services (NYDFS) Cybersecurity Regulation (23 NYCRR 500), which mandates application-layer penetration testing at minimum annually for covered entities.
Mobile Application Security
Mobile applications introduce risks tied to insecure local data storage, improper platform API usage, and insecure communication. OWASP maintains a separate Mobile Application Security Verification Standard (MASVS) with two verification levels: L1 for standard security and L2 for defense-in-depth requirements.
Mobile Security Authority covers platform-specific security controls for iOS and Android deployments, including certificate pinning, secure enclave usage, and app store policy compliance. Florida Security Authority covers Florida-specific data protection obligations affecting mobile app developers who handle health or financial data for Florida residents.
API Security
APIs are the connective tissue of modern software architecture, and they introduce a distinct attack surface documented in the OWASP API Security Top 10. Broken Object Level Authorization (BOLA), the top-ranked API risk, enables attackers to read or modify records belonging to other users by manipulating object identifiers in API requests.
Network Security Authority covers the network-layer controls that complement API security, including rate limiting, traffic inspection, and API gateway configuration. Advanced Security Authority addresses enterprise-grade API security architectures, including zero-trust API access models and mutual TLS enforcement.
Cloud-Native Application Security
Cloud-native applications built on containers, serverless functions, and managed services require security controls adapted to ephemeral infrastructure. The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides 197 control specifications across 17 domains applicable to cloud application deployments.
Cloud Security Authority maps CSA CCM controls to common cloud provider configurations. Cloud Defense Authority documents container security hardening, including image scanning, runtime protection, and Kubernetes RBAC configuration. Cloud Compliance Authority addresses FedRAMP, SOC 2, and ISO 27001 compliance in cloud application contexts.
Supply Chain Security
Software supply chain attacks — exemplified by the SolarWinds incident disclosed in December 2020 and the Log4Shell vulnerability disclosed in December 2021 — demonstrated that application security cannot be bounded to first-party code. NIST SP 800-161r1 addresses C-SCRM (Cyber Supply Chain Risk Management) and applies directly to software procurement decisions.
Data Security Authority addresses data integrity controls relevant to supply chain scenarios, particularly for software that processes sensitive records. Encryption Authority covers cryptographic controls for signing artifacts, verifying provenance, and protecting data in transit across supply chain integrations.
State and Regional Compliance Contexts
AppSec obligations vary by geography because state legislatures have enacted distinct breach notification, data protection, and sector-specific cybersecurity requirements. Texas Security Authority covers obligations under the Texas Identity Theft Enforcement and Protection Act and the Texas Data Privacy and Security Act (TDPSA), effective July 1, 2024. Miami Security Authority addresses compliance considerations for South Florida's financial services and healthcare application operators, while [Orlando Security Authority](
For related coverage on this site: Cybersecurity: What It Is and Why It Matters and Regulatory Context for Cybersecurity.
References
- NIST SP 800-218: Secure Software Development Framework (SSDF)
- NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations
- CISA: Secure by Design Principles
- OMB Memorandum M-22-18: Enhancing the Security of the Software Supply Chain
- FedRAMP: Federal Risk and Authorization Management Program
- California Attorney General: California Consumer Privacy Act (CCPA)
- NIST National Vulnerability Database (NVD)
- NIST SP 800-64: Security Considerations in the System Development Life Cycle
- Federal Trade Commission: Start with Security — A Guide for Business