Most current threats are directed at the application layer, code security analysis is a must for any competitive organization. Application analysis searches software for vulnerabilities like application backdoors or malicious code so they can be fixed before they are discovered and exploited by hackers.
Many code security analysis solutions, however, are inadequate to the task. Some return so many false positives that developers spend more time tracking down non-threats than real problems. Some are prohibitively expensive to purchase, install and update.
To obtain the most comprehensive results and minimize risk, this level of analysis employs automated source code static analysis to identify a preliminary set of vulnerabilities, followed by a full manual analysis of the source code searching for types of vulnerabilities which are not reliably found through automated tools.
This deep-dive process is most appropriate for commercial applications that have the highest security requirements, such as applications that process a large volume or high-value financial transactions. Comprehensive assessments ensure the lowest level of residual risk.
The coupling of secure code review along with penetration generally (a white box activity) gives positive and unconventional results as knowing the internal code structure gives an added advantage in terms of knowledge which can be used to create test cases and abuse cases.
Using this approach, a productive penetration testing can take place, since testing can be focused on suspected vulnerabilities. For example, a penetration test on an application using a vulnerable framework can concentrate on the weaknesses that exist in those frameworks or libraries.
The results from the white box activity can be used to target other similar areas for code review. For example, if output encoding is not implemented in one module or feature of an application, chances are it is not implemented elsewhere in the application.
If you prioritize security in your business, you need both a secure code review and pen-testing.