Brought to you by:
Enterprise Strategy Group | Getting to the Bigger Truth™
By Melinda Marks, ESG Senior Analyst
JANUARY 2022
Which of the following would you say are your organization’s primary challenges regarding security analytics and operations? (Percent of respondents, N=406, three responses accepted)
Source: Enterprise Strategy Group
Percentage of organizations that agree with the following general statements about cloud-native security. (Percent of respondents, N=383)
Source: Enterprise Strategy Group
• Using static application testing without slowing development cycles. Organizations are using a mix of vendor solutions along with some free and/or open source testing tools to help developers perform different types of static testing on their code, including scanning their application code, their open source code and their IaC.
But they vary in ease of use and setup; if it doesn’t work in developer workflows, or if it takes to long to run, developers may want to skip the testing processes. Result quality, including frequency of false positives, also varies, making it frustrating for developers if they need to spend time fixing something that is not a real issue. It can also be difficult to interpret the results or understand what is needed to remediate the detected issues. Another shortcoming is that scanning tools are based on previously discovered vulnerabilities instead of identifying new vulnerabilities, so they can miss critical application flaws.
• Gaining an assurance partner. The insurance company CISO discussed how it may take a few years to fully understand security for the cloud as new technologies and security solutions continue to emerge. He described how they use some open source tools, some newer solutions from startups, and solutions from established vendors. But he is constantly evaluating their effectiveness and utilization and whether the tools can be more effectively and efficiently used when they are integrated. For example, if you have a vulnerability management solution, you may want to enrich it with threat intelligence.
So he is using HackerOne as a way to measure the effectiveness of his programs and efforts, including setting policies and integrating testing in development. He also uses HackerOne to validate the security effectiveness of their Web Application Firewalls (WAFs).
• Gap analysis for identifying and fixing security program weaknesses. The customers interviewed also described how using HackerOne services provides a feedback loop for program improvements. When the ethical hackers find vulnerabilities and provide their analysis, it gives security teams the information they need to make security program improvements, such as improving scanning tools or modifying threat models to proactively reduce risk. The services help them identify and understand changes that could be made to prevent security incidents, helping them put processes in place that have a high impact on reducing risk.
HackerOne helped the software company analyze many of the common vulnerabilities that were discovered and create the right mechanisms to catch and fix those issues themselves. For example, they discovered a common flaw that allowed subdomain takeovers which can lead to significant breaches. The internal team was able to set up automated scans of assets for unused subdomains, helping them drastically reduce their threat risk.
- CISO, leading networking company
This ESG White Paper was commissioned by HackerOne and is distributed under license from ESG.
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
Enterprise Strategy Group | Getting to the Bigger Truth™
Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.