Outsourced apps a security minefield, study finds

But open source developers do well

Outsourced software is a hotspot for the sort of hidden security problems that leave applications vulnerable, an analysis by code testing outfit Veracode has warned.

The company's latest 'State of Software' analysis looked at nearly 3,000 applications submitted by third-parties for security code review, finding that 57 percent failed to meet acceptable levels for security-worthiness on first pass.

In terms of exposure to the OWASP (Open Web Application Security Project) Top 10 most critical web application flaws, only 40 per cent made the grade.

Drilling down by development sector, Veracode found that outsourced software code posed the biggest security risk, with a staggering 93 per cent of apps looked at failing to reach an acceptable standard on first assessment.

Although the numbers involved are small - the company only assessed around 30 outsourced apps out of a total of 2,922 - the issue of outsourced code vulnerability is not a new worry. In 2008, recently acquired rival Fortify Software found that outsourced code was a major area of unknown coding behaviour which could lead to problems.

Up to 76 per cent of internal code had elements of outsourced of third-party code within it, so some of the problem could be hidden within this sector.

"It indicates the amount of security testing and education that has gone on," said Veracode CTO, Chris Wysopal of outsourced app houses.

Open source meanwhile scored above other development sectors in terms of the OWASP Top 10 most critical web application flaws, with 49 per cent of open source apps passing this test on pass one, against 12 per cent of internally-developed apps, and only 7 per cent of commercially-developed apps.

For general security flaws, 58 per cent of open source apps failed on first inspection, roughly on par with the 54 per cent figure for internal apps, but better than the 66 per cent of commercial apps that failed at this stage.

In Wysopal's view, some of this differences between sectors might be explainable by the fact that the commercial apps submitted were more likely to be interactive apps inherently more prone to security problems.

Internal apps, by contrast, tended to be higher quality for a simple reason. "They [the development team] are going to run the code they write. They have a vested interest in security." Open source also did respectably because of the process of open code review that was inherent to its development model.

Once security issues had been identified, open source remediated the problems in an average of 12 days, internal software in 15 days, and commercial software in 19 days.

Fifty-two percent of the vulnerabilities that needed remediation in static analysis were found to be cross-site scripting related, with .NET showing an unusually high frequency of this issue. Java was another soft spot.

Tags securityVeracodeSME

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

John E Dunn

Techworld

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest News Articles

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?