Building in security without putting the brakes on application development


For those managing software development teams, balancing the need for cybersecurity with the pressure to deliver projects on time is no small task. There’s often a perception that security tasks will slow down the development process, introducing potential bottlenecks to release times. In fact, our recent research found that 61% of developers are concerned about security getting in the way of their workflow.
As with any project one of the most important aspects is aligning everyone towards the same goal which is, ultimately, safe and reliable applications. This means making the right choices when it comes to security so that their time is focussed on developing rather than fixing problems. After all, it’s far less disruptive and costly to deal with any software issues (including security ones) early on in the life cycle, rather than to have to rework an application, or pull it entirely to make fixes, once it’s running.
The key is embedding application security measures for your developers so that they are equipped with the tools and knowledge they need for it be seamless and as low-friction as possible.
VP Portfolio Marketing, Checkmarx.
Prioritizing for impact
Effective business app security begins with prioritization. Development teams have limited time, so they need to focus on the vulnerabilities that are most critical. Prioritizing vulnerabilities involves assessing their severity, exploitability and the criticality of the application they reside in.
A strong security toolset should incorporate mechanisms to accurately classify vulnerabilities. For example, vulnerabilities should be prioritized based on CVSS (Common Vulnerability Scoring System) scores, which consider factors like the ease of exploitation and potential impact. Additionally, existing security tools should integrate with threat intelligence feeds to correlate vulnerabilities with known exploits in the wild, enabling developers to focus on those issues that pose the most immediate risk.
Security testing should be conducted at multiple stages of the app development lifecycle. Traditionally, security testing included Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). But there are more things to consider now, such as Software Composition Analysis (SCA), container security, and Infrastructure-as-Code (IaC) security. And as it pertains to prioritization, even runtime protection provides data that can be correlated with SAST, SCA, etc., data to help prioritize. SAST can identify vulnerabilities in the source code, allowing developers to address issues before the code is even compiled.
Dynamic Application Security Testing (DAST) should follow in later stages, providing a comprehensive approach that ensures no critical vulnerabilities slip through the cracks. Prioritizing vulnerabilities at each stage helps keep development on track while maintaining a strong security posture.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Integrating security into the development workflow
Applications today are far more complex than they were just a few years ago. More than 50% of developers are now utilizing AI in their workflows, and the modern application is composed of multiple components: proprietary source code, open-source libraries, and even AI-generated code. This introduces new layers of security and legal risks, making it increasingly challenging for developers to stay ahead of potential vulnerabilities.
So, for security to become an integral part of the software development process, project leaders must introduce processes and practices that can easily incorporate security measures into the developer’s general workflow. It’s about making their life easier, instead of adding a load of new responsibilities on their shoulders.
Automating AppSec processes is a great solution here. Automated security scanning can be integrated as part of the CI/CD pipeline, with the results automatically brought into the IDE. From here, they can check in their code for us to scan for vulnerabilities and, with the results at hand to rectify any issues as needed. This immediate feedback loop allows teams to catch and address vulnerabilities—such as an SQL injection—as early as possible. Real-time feedback on secure coding practices is provided in the IDE as a developer writes code, reinforcing secure coding practices, which are crucial as the complexity of applications grows.
In addition to IDE integration, security checks should also be part of the source control management (SCM) system. Automated security checks during code commits or pull requests ensure that vulnerabilities are flagged before they are merged into the main branch. This early intervention helps prevent insecure code from entering production. In cases where vulnerabilities are found, automated systems can immediately generate bug tickets with detailed descriptions of the issue and guidance on how to resolve it, streamlining the remediation process.
With the rise in the use of third-party and AI-generated code, automated code reviews are also essential for maintaining security standards. These reviews can be configured to enforce coding best practices and flag common security issues like improper input validation, insecure configuration, or poor error handling. By integrating these reviews into the development workflow, teams can ensure that security is built into every stage of the process, from the first line of code to deployment.
Even with the best security tools in place, developers need the right support to effectively resolve vulnerabilities. Security tools should do more than just flag issues; they should offer actionable remediation guidance alongside vulnerability reports. When a vulnerability is identified, developers should be equipped with the context they need to understand not only that a problem exists, but also why it exists and how to resolve it efficiently. Providing relevant code examples or references to documentation can help developers address vulnerabilities swiftly without having to spend unnecessary time researching solutions.
To further empower developers, it’s essential to invest in building a strong foundation of secure coding practices. Security training should be viewed as a core part of a developer’s professional development, offering continuous learning opportunities through e-learning platforms or in-person workshops. Practical, hands-on exercises are key to helping developers apply what they’ve learned to real-world scenarios. Topics like cross-site scripting (XSS), SQL injection, and insecure deserialization should be covered extensively, along with best practices to prevent these vulnerabilities.
Over time, as developers participate in ongoing security training, their knowledge will naturally integrate into their daily workflows. This proactive approach to security ensures that they write secure code from the start, reducing the number of vulnerabilities introduced into the codebase.
In short, application security should be seen as an integral part of development, not a roadblock. Prioritizing vulnerabilities, integrating security into existing workflows, and empowering developers with the right knowledge and tools are key strategies for maintaining both speed and security in software projects.
We’ve featured the best DevOps tools.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
For those managing software development teams, balancing the need for cybersecurity with the pressure to deliver projects on time is no small task. There’s often a perception that security tasks will slow down the development process, introducing potential bottlenecks to release times. In fact, our recent research found that 61%…
Recent Posts
- Reddit is experiencing outages again
- OpenAI confirms 400 million weekly ChatGPT users – here’s 5 great ways to use the world’s most popular AI chatbot
- Elon Musk’s AI said he and Trump deserve the death penalty
- The GSA is shutting down its EV chargers, calling them ‘not mission critical’
- Lenovo is going all out with yet another funky laptop design: this time, it’s a business notebook with a foldable OLED screen
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010