Michael Weider

As IT budgets continue to be squeezed and organizations struggle to find new ways to grow and innovate, outsourcing moves higher on the CIO's "to do" list. The privacy and security implication of outsourcing relationships is a growing concern for many organizations. Most of this discussion on this topic has focused on the transfer and handling of personal data but one area that has not been well-documented is Web application development. Gartner Inc. cites 75 percent of all attacks on information security are directed at the application level. Watchfire's own research shows that the vast majority of Web applications are vulnerable to these attacks. Since many Web applications are used to collect confidential customer or employee data, the potential for a privacy breach is high.

Outsourcing application development - including web applications - seems a logical choice considering the potential cost and time savings. But at what expense? As more application development is outsourced to third parties, how can we be sure that these applications are free of security vulnerabilities that might be leveraged to expose confidential customer data?

In this article, we'll review some of the top security vulnerabilities in outsourced applications, and what you can do to prevent them from happening.

Ways Hackers Typically Exploit Application Vulnerabilities

Experts agree - web applications present one of the most significant security risks to your organization. In 2006, the two most common security issues cited were Cross-Site Scripting (XSS) and SQL Injection vulnerabilities. With these attacks, hackers utilize inadvertent defects in Web applications to steal information from users and break into confidential databases.

Common web application vulnerabilities and security defects include Cross-Site Scripting (XSS) and SQL Injection. Since every Web site and web application is different, the location, number and severity of these and other application vulnerabilities will differ significantly between sites. The only way to fix these vulnerabilities is to identify them in the application and recode the application to fix the flaw(s) that enable them. The window of exposure for these vulnerabilities can be quite significant because they often go undetected until a breach has occurred.

Privacy Implications of Web Application Vulnerabilities

A Web application security incident's affect on your customers can be devastating and can range from identity theft to session hijacking to the compromise of confidential and private customer data. XSS is one of the leading methods used in identity theft (and an obvious concern to financial and healthcare institutions); it leverages flaws in applications to trick users into divulging confidential information.

SQL injection is one of the main attacks used when back-end databases are compromised. With SQL injection, an attacker adds SQL code to a web form input box to gain access to resources or make changes to data. The risk of SQL injection attacks is on the rise because of automated tools which increase the potential damage of an exploit.

Many of the phishing email-based schemes use XSS and other application layer attacks to trick users into giving up their credentials. As web applications become more pervasive and more complex, so do the techniques and attacks hackers are using against them. Many new vulnerabilities and attack methods discovered or reported show an alarming trend toward attacks with multi-faceted damages. This means the hackers are using more powerful attacks to cause significantly more damage, while at the same time covering their tracks is becoming easier.

There are several issues to consider first before beginning an off-shoring project:

Make security expertise a factor in deciding where to outsource your application development:

Application security expertise is not widespread among development firms. Many outsourcers have impressive quality assurance designations but very few have proper security training. Make sure that your outsourcer is capable of delivering not just a quality product but a secure product. Ask the question: Do they make security part of their development process, how do they test applications for security and what documentation can they give you to demonstrate processes were followed and applications were properly tested?

Make security part of your service level agreements and contracts:

When outsourcing web development to a third party, security requirements are often overlooked or given minimal attention. Proper security testing can sometimes increase the time and cost of a project by 10-20 percent. If you don't make security a contractual requirement no outsourcer will be eager to cover this cost. Applications should be required to meet your own security standards, you should have the right to do acceptance testing and the outsourcer should be responsible for fixing security defects that are identified.

Perform regular security audits and defect testing on delivered applications:

In addition to requiring all third party applications to be scanned using a web application testing tool before delivery, conduct thorough and regular assessments on the developed applications to make sure they continue to pass your security standards. Performing continual security testing throughout the software development lifecycle at key points during the various stages from development to QA to Staging will reduce costs and significantly reduce risk.

With the proper processes and checks in place, forward-looking companies can still take advantage of the value of outsourcing.

Michael Weider is the founder and CTO of Watchfire, a leading provider of software and service to help ensure the security and compliance of Web sites. www.watchfire.com.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»