Introduction
The scale and intensity of cybersecurity threats have increased this past year and unfortunately have become ubiquitous across enterprises of all sizes. As the comprehensive 2021 Data Breach Investigations Report makes clear, both SME’s and large enterprises suffer similar exposure to threat actors and the data they compromise. No enterprises are immune to cybersecurity threats, with even small non-profits coming under full attack. What can and often does differ substantially are the capabilities of small and mid-sized companies in their resources and abilities to prevent and stave off these attacks.
The sophistication and maturity of organizations tend to grow in tandem with size. While this may be generally true, when viewing the security posture and organizational decision-making approach of small and mid-sized companies, it poses a particular industry susceptibility, given that cybersecurity threats do not differ across enterprise sizes. This vulnerability plays out, in particular in “Industry 4.0” manufacturing enterprises. Among many reasons for the discrepancy between sizes of companies and the ability for prevention and mitigation, previous research has pointed to the biggest culprit being budget constraints.
The current research findings provide a comprehensive view into the current state of application security in mid-market-sized companies that develop software. It reveals and quantifies the challenges and opportunities growing companies face in scaling their secure development efforts. Specifically, it provides “deep dives” into issues of security maturity, the speed of software development, application security requirements, training, overall challenges, and the desire for automation.
Current State
For over two thirds of mid-market companies that develop custom software, security sits within the IT department. Creating software that is secure by design and shifting security left are top priorities, especially for larger mid-sized companies.
Speed of Software Development
Over 80% of mid-market organizations indicate speed is a high priority in their development of software applications.
Less than half of mid-market companies used focused metrics or tools to measure the speed of their software development.
Use of Document Application Security Requirements
Almost all (98%) of mid-market organizations that develop custom software documents their application security requirements. Most do so for at least half or more of their applications,
The number of tools employed in software development typically runs five or more, with a sizable portion exceeding ten or more in total.
Training
Almost three quarters (71%) of mid-market companies spend three or more days annually training their developers on security issues. Not surprisingly, the majority of respondents favoured “Just in Time Training”, with content and specific answers to security questions embedded directly in their development tools.
Defining Security Requirements
Very few companies are able to define security for new software nor are they able to track implemented controls in less than a day.
The time spent is undoubtedly tied to manual processes versus built to purpose software. Most (86% overall) believe that tracking inherited security from third parties would make the speed of delivering software faster or a great deal faster.
Challenges and Solution
The top challenges companies encounter when implementing DevSecOps are budget constraints and managing legal, regulatory & compliance controls. These challenges, along with the time it takes to create software applications while documenting appsec processes along the way, have resulted in very high interest for automating proactive security and compliance processes.
Conclusion
The need to build software with security by design, and in so doing to shift security left, is broadly accepted as one of the top priorities among mid-market-sized companies that produce software. Nonetheless, mid-market companies struggle to proactively define security for new software under development alongside an inability to document and track implemented controls in reasonable time periods. These shortcomings create a dilemma in slowing the release of new software and in many cases, releasing software with insufficient coverage of documented controls.
Our research uncovered the burden of using manual controls as well as the difficulty in tracking inherited security from third parties. To overcome these deficits, a minority of mid market companies turn to external consultants. Findings from this study illustrate that this approach is often costly. Given that our research validates prior findings highlighting budget constraints as the largest culprit in implementing DevSecOps, better software solutions are needed for implementing more comprehensive and proactive cybersecurity processes. It was not surprising to learn that over 90% of this market is interested in solutions that automate proactive security and compliance processes.
Companies looking to accelerate their software development in tandem with stronger cybersecurity compliance measures are looking to just-in-time training (JITT) for their software developers and automated built-to-purpose cybersecurity software for accomplishing these goals.