Trustwave Government Solutions Attains StateRAMP Authorization. Learn More

Trustwave Government Solutions Attains StateRAMP Authorization. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

The Willy Wonka World of Application Security Defenses

One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of applications that are running on your network. To lighten the load and eliminate the need for having supernatural abilities, let’s go over some simple tasks a security defender can take to track, detect, and even block application threats.

 

Finding Your Applications

Finding applications typically depends on the architecture platform and the software tracking tools available.

Some examples would be:

  • On-prem or cloud-based Windows and Linux operating systems: Use an EDR like Microsoft Defender for Endpoint
  • Cloud-based applications: Use a CSPM like Defender for Cloud

 

Determining Your Application Detection Tools

The methods for tracking these applications vary by vendor. Ideally, a query tool will be available that allows you to manipulate the search results as needed to produce useful reports and dashboards.

Some suggestions on what to track are:

  • Operating System Installed applications – Your EDR may support vulnerability scanning, which can identify unpatched/risky applications, as well as malicious software planted by intruders.
  • Web-based applications – Don't forget that many 'applications' are web-based and not necessarily installed on a physical/virtual machine. For example, Gmail.com or SalesForce.com are web-based applications. Nonetheless, they are just as important to monitor as a locally installed app. An EDR that shares information with a CASB (e.g., Defender for Endpoint and Defender for Cloud Apps) can track these web apps.
  • Cloud/Container-based applications – A modern DevOps teams might create cloud-based applications using cloud-specific resources such as Kubernetes and serverless resources like AWS Lambda and Azure Functions. A CSPM like Defender for Cloud can help monitor these applications.

 

Detecting and Blocking Malicious Activity in Applications

Once the location and type of applications are identified, a strategy on how to detect malicious activity can be created. Some suggestions on what malicious activity to track are:

  • Operating system-based attacks: EDRs are good at detecting thousands of malicious activities at the operating system level.
  • Web-based attacks: Many web-based apps should be placed behind a WAF, which can provide many threat detection capabilities.
  • Container-based attacks: Container-based apps should have their container images scanned in an operational state, as well as scanning the repository in which the images are stored. This is often performed by a ‘cloud workload protection platform (CWPP)’ feature offered by a cloud service provider.

 

But Wait, There’s More...

There are also ways to ‘block list’ applications. Some examples are WDAC – Windows Defender Application Control and Microsoft Defender for Cloud Apps.

For more suggestions on protecting cloud-based applications, see the ‘Well Architected Framework’ documentation for your cloud provider. You can also use a Zero Trust Network Access architecture (or SASE – Secure Access Service Edge) for protecting applications, but that’s outside the scope of this article.

 

Summary

Detecting and eliminating risky applications is a critical responsibility for cyber defenders. No one tool will likely be able to perform this task so an understanding of the variety of applications and how to protect each is necessary.

 

References

 

About This Blog Series

Follow the full series here: Building Defenses with Modern Security Solutions

This series discusses a list of key cybersecurity defense topics. The full collection of posts and labs can be used as an educational tool for implementing cybersecurity defenses.

 

Labs

For quick walkthrough labs on the topics in this blog series, check out the story of “ZPM Incorporated” and their steps to implementing all the solutions discussed here.

 

Compliance

All topics mentioned in this series have been mapped to several compliance controls here.

About the Author

David Broggy is Senior Solutions Architect, Implementation Services at Trustwave with over 21 years of experience. He holds multiple security certifications and won Microsoft's Most Valuable Professional (MVP) Award for Azure Security. Follow David on LinkedIn.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo