RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityNovember 7, 2024

AppSec vs. product security: Secure by Design demands a strategy shift

Here's why and how to push your application security further into ProdSec — and what that means to achieving the goals of CISA's Secure by Design.

smiling woman
Ericka Chickowski, Freelance writer.Ericka Chickowski
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
man holding concrete walls open

For the Secure by Design initiative of the Cybersecurity and Infrastructure Security Agency (CISA) to really change the security landscape, the scope of traditional application security (AppSec) will need to expand considerably beyond shifting code testing left (earlier in the software development lifecycle). What is required is a more holistic approach that considers the security of software as it is deployed within products, within interconnected networks, and within broader digital ecosystems.

Many security visionaries believe that today's AppSec confines are too limited. They argue that Secure by Design principles and the systematic securing of the software supply chain need to be broadened to include product security that applies to everything from enterprise software platforms to IoT-enabled refrigerators.

Here's what you need to know about how expanding your AppSec approach to ProdSec can help achieve reaching Secure by Design's goals — and bolster your organization's overall software security strategy.

Special Report: How to Manage Commercial & Third-Party Software Risk

AppSec’s roots in vulnerabilities keep it too limited

Most of the AppSec world is stuck, still relying on the programs — SAST, DAST, RASP — that were born in an effort to relieve overwhelmed vulnerability management teams and get ahead of the crushing volume of flaws found in production software. They shifted testing earlier in the SDLC and prioritized risks discovered there to limit the number of critical flaws pushed live. It was an improvement, but simply testing for flaws in the code is a poor substitute for programmatically architecting secure software out of the gate.

Sam Rehman, CISO of the software development firm EPAM Systems, said that AppSec is often perceived too narrowly, as a process for adding security checks to the development of software, to the deployment of software, or to software during runtime. “This limited perspective fails to encompass the broader context that's essential for an application's effectiveness," Rehman said.

He advocates product security that brings Secure by Design principles to the design phase of a product or service. “This involvement extends to defining robust product policies and controls that are intricately woven into the product's architecture and functionality,” he said. It also includes appropriate implementation of controls and configurations, measures for SecOps teams to manage incidents involving software-based products, and robust information and signals around the software once it’s deployed.

While these components are critical, they don't constitute the entire solution unless viewed within the context of ultimate engagement — from users to products.

Sam Rehman

Jamie Boote, associate principal security consultant at Synopsys Software Integrity Group, said many AppSec veterans have seen the need for such a comprehensive approach to software security and implemented programs that focus on what happens between software design and release, expanding to support DevOps, cloud and container infrastructures, and other product areas that impact software development.

Expanding AppSec to ProdSec: Organizational mentality is key

This idea of moving "beyond AppSec" was recently broached in an article of that name on the Securely Built Substack by software security guru Derek Fisher, who called for a new label to accommodate the broader scope: ProdSec.

ProdSec encompasses more than just securing the application. While an application refers to a specific software program or tool, a product encompasses a more comprehensive software solution, often comprising of multiple applications and associated components designed to meet broader user needs or organizational requirements.

Derek Fisher

Nick Sikorski, head of Deloitte’s product security practice, said that while product security has not been viewed as a standalone function that calls for senior leadership and investment, things are changing. Today, he said, "the reporting structure and seniority of the product security function is evolving with an increased push to senior-level positions that often sit within corporate cybersecurity or R&D teams."

He said organizations are finding that a strong emphasis on product security is helping them stay agile and flexible in delivering products while driving deeper changes to the security posture of the software that underlies them.

By improving teaming across product security, R&D, quality and other functions within an organization, companies can build a culture of security and help keep products safe, secure, and reliable. They take a security-by-design approach to new product development while also continuously working to improve product security and related business processes.

Nick Sikorski

Product security will be the key to considering security at every phase of product development, not just as code is being written, said Chris Roeckl, chief product officer of Appdome.

By actively participating in each stage of the development process, the product security team helps embed security considerations into the software's design, architecture, coding, testing and release to production. This proactive approach is a virtuous cycle and minimizes the risk of vulnerabilities and ensures that security is an integral aspect of the final product.

Chris Roeckl

To do it right takes “orchestral coordination” across a web of different third parties, off-the-shelf software, and open-source components, said Sikorski. And even after products go to market, the product security function keeps on ticking to cover post-market risk management, including security monitoring and incident-handling capabilities, he said.

Will AppSec go away, then?

So if ProdSec is the function that enables Secure by Design, what happens to AppSec? Many believe that it should remain — and become a subset of the broader ProdSec initiative.

David Lindner, CISO for Contrast Security, said AppSec concentrates on securing the code and functionality of a single software application, but “product security takes a holistic view of the entire technology product, considering the broader environment and potential attack vectors that may emerge from the communications between various components.”

EPAM Systems' Rehman said no one should think that ProdSec replaces AppSec. "Rather, it complements it, potentially incorporating it as [an underlying] layer within the security framework,” he said.

Secure by Design demands better tooling

Saša Zdjelar, Chief Trust Officer at ReversingLabs, said recently that for Secure by Design to deliver on it's promise, organizations need more holistic tools that work for producers and consumers of software. Zdjelar explains what he means by holistic AST by describing what crash tests did for ensuring the safety of cars.

You crash-test it, and then you provide the insights into how it did from various angles at various speeds, airbags, crumple zones, all those sorts of things that we have agreed are the characteristics of a secure vehicle or a safe vehicle. But you wouldn't crash-test a radio volume knob and a windows up-down button and a seatbelt separately and a rear car seat separately and a visor separately. You crash-test the vehicle when it's been fully assembled so that you know how the system as a whole operates or will perform in that type of environment.

Saša Zdjelar

One of the big problems with the shift-left movement of recent years, Zdjelar said, is that it focuses too intently on component views to the detriment of understanding the context of how it all operates in the completed software package. When Secure by Design is fully realized, the benefit will be early analysis while also doing integrity checks that ensure the crash-worthiness of software before it is shipped.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI coding racing

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top