Web application security - the fast guide 1.1 | Page 174
Chapter 9 - Secure Application Development
P a g e | 174
9.1 Injecting security - Penetration and patch approach
Figure 64: penetration and patching cycle approach
Web application security in comparison:
even though web applications considered as cursed with openness to world and
public access difficulties in addition to short development cycle but it still has
many advantages on from patching and recovering point of view.
The traditional application patching is done by providing a patched version and
hopping that users will download, in time where any needed patch to the web
application can be done directly by uploading the patched version to the server.
so an acceptable solution is to apply the penetrate and patch approach searching
for vulnerabilities and trying to patch.
The problem of this approach is the related cost, as discovering vulnerabilities at
the production time will cost according to many studies thirty times more than
its cost at the starting phase and each patching and release cycle will derive the
need to retest that the patching did not cause other vulnerabilities or cause a
functionality issue.
9.2 Security centric approach
The penetration and patching approach can be an acceptable approach in many
scenarios specially when a limited development period, but why waiting till the
end, why not enforcing the security from the beginning as an essential part of the
development cycle.