Pillar A: CybersecurityA4

Application Security

OWASP Top 10, secure SDLC, SAST/DAST/IAST, API security, code review, DevSecOps.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Application Security.

What is Application Security?

Application security (AppSec) is the practice of finding, fixing, and preventing security vulnerabilities in software applications throughout their entire lifecycle — from design and development through deployment and operation. As organizations shift to cloud-native architectures, microservices, and API-first designs, the application layer has become the primary target for attackers.

The OWASP Top 10 remains the most widely recognized framework for understanding web application security risks, covering injection attacks, broken authentication, security misconfigurations, and more. Modern AppSec extends well beyond web applications to include API security (OWASP API Security Top 10), mobile application security, and the security of serverless and containerized workloads. DevSecOps integrates security testing directly into CI/CD pipelines, making security a shared responsibility across development and operations teams.

Static Application Security Testing (SAST) analyzes source code for vulnerabilities without executing the application, while Dynamic Application Security Testing (DAST) tests running applications from the outside. Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) provide real-time analysis during execution. The Secure Software Development Lifecycle (SSDLC) ensures security is considered at every phase — threat modeling during design, secure coding during development, security testing before release, and runtime protection in production.

Why it matters

Applications are where data lives and business logic runs. The majority of breaches exploit application-layer vulnerabilities, making AppSec the most impactful investment an organization can make in reducing real-world risk.

Application security is the domain where development and security converge. It relies on network security to protect the infrastructure, identity management for authentication, and cloud security for the deployment environment, while providing the last line of defense for business logic and data.

Key topics

OWASP Top 10 (Web Application Security Risks)
OWASP API Security Top 10
Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Interactive Application Security Testing (IAST)
DevSecOps and CI/CD pipeline security
Secure Software Development Lifecycle (SSDLC)
Threat modeling (STRIDE, PASTA, LINDDUN)
API security and authentication (OAuth 2.0, JWT)
Software Composition Analysis (SCA) and dependency management
Container and serverless application security

Standards and frameworks

Curated resources

Authoritative sources we ground Application Security questions in — frameworks, research, guides, and tools.

Black Hat / DEF CONguide

Black Hat / DEF CON Archives

Conference presentations covering novel attack techniques and defensive research. Essential for cutting-edge offensive/defensive questions. AI Village talks particularly relevant for Pillars B and C.

OWASPtool

OWASP Software Assurance Maturity Model (SAMM) v2

Five business functions (Governance, Design, Implementation, Verification, Operations) for measuring and improving AppSec programs. Good for maturity model questions.

Veracodeguide

Veracode State of Software Security Report

Annual report with empirical data on flaw prevalence by language, fix rates, and security debt. Useful for data-driven AppSec questions. Vendor but based on scan data across thousands of orgs.

Synopsysguide

Synopsys Open Source Security and Risk Analysis (OSSRA) Report

Annual analysis of open source usage and vulnerability data. Key stats on open source in commercial codebases (typically 70-80%+). Grounds supply chain and AppSec questions in real data.

OWASPframework

OWASP Top 10 — Web Application Security Risks

The most widely referenced web application security awareness document. Covers injection, broken auth, XSS, and more.

OWASPframework

OWASP Application Security Verification Standard (ASVS)

Framework of security requirements for designing, developing, and testing secure web applications. Three verification levels.

OWASPframework

OWASP API Security Top 10

Top 10 security risks for APIs. Covers broken object-level authorization, authentication failures, excessive data exposure, and more.

Semgreptool

Semgrep — Static Analysis

Fast, open-source static analysis tool for finding bugs and enforcing code standards. Supports 30+ languages with custom rules.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

BSCPProfessional·UnbekanntOfficial page →

Portswigger Burp Suite Certified Practioner

Portswigger Burp Suite Certified Practioner

C)SWAEProfessional·Mile2Official page →

Mile2 Secure Web Application Engineer

Mile2 Secure Web Application Engineer

CASEProfessional·EC-CouncilOfficial page →

EC Council Certified Application Security Engineer (.NET or Java)

EC Council Certified Application Security Engineer (.NET or Java)

CASP+Expert·CompTIAOfficial page →

CompTIA Advanced Security Practitioner+

CompTIA's SecurityX (formerly CASP+, current exam code CAS-005) is one of the few vendor-neutral advanced certifications for technical security experts without management focus. It deliberately positions itself as a technical alternative to CISSP and is recognized by DoD and US government agencies as an 8570-compliant credential, which is a real advantage in government environments. In the private sector, market perception is mixed: CISSP clearly dominates job postings, but SecurityX provides a credible signal for technically deep skills. The pass/fail format without score disclosure is unusual and criticized by some as lacking transparency. Performance-based questions increase the practical rigor.

CCSCProfessional·CertNexusOfficial page →

CertNexus Cyber Secure Coder

CertNexus Cyber Secure Coder

CDPSEProfessional·ISACAOfficial page →

Certified Data Privacy Solutions Engineer

ISACA certification for Privacy Engineering. Focus on technical implementation of privacy requirements: Privacy Governance, Privacy Architecture, and Data Lifecycle Management. Bridge between privacy and technology.

CEHAssociate·EC-CouncilOfficial page →

Certified Ethical Hacker

Offensive-concepts breadth; light on hands-on rigor compared to OSCP.

CIPTProfessional·IAPPOfficial page →

Certified Information Privacy Technologist

Privacy engineering, privacy-by-design in products and platforms.

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CREST CCTAPPProfessional·CRESTOfficial page →

CREST Certified Web Application Tester

CREST Certified Web Application Tester

CREST CSAMProfessional·CRESTOfficial page →

CREST Certified Simulated Attack Manager

CREST Certified Simulated Attack Manager

CSSLPProfessional·ISC2Official page →

Certified Secure Software Lifecycle Professional

Secure SDLC, threat modelling, secure architecture across product teams.

F5 CAProfessional·F5Official page →

F5 Big-IP Certified Administrator

F5 Big-IP Certified Administrator

F5 CSE SecExpert·F5Official page →

F5 Big-IP Certified Solution Expert - Security

F5 Big-IP Certified Solution Expert - Security

GCSAProfessional·GIAC / SANSOfficial page →

GIAC Cloud Security Automation

Security-as-code: IaC hardening, CI/CD guardrails, automated cloud response.

GMOBProfessional·GIACOfficial page →

GIAC Mobile Device Security Analyst

GIAC Mobile Device Security Analyst

GWAPTProfessional·GIACOfficial page →

GIAC Web Application Penetration Tester

GIAC Web Application Penetration Tester

GWEBProfessional·GIAC / SANSOfficial page →

GIAC Certified Web Application Defender

Defender-side AppSec — OWASP Top 10, API security, secure design patterns.

HTB CBBHProfessional·Hack The BoxOfficial page →

Hack the Box Certified Bug Bounty Hunter

Hack the Box Certified Bug Bounty Hunter

OSCE3Expert·OffSecOfficial page →

Offensive Security Certified Expert 3

Offensive Security Certified Expert 3

OSCPProfessional·OffSecOfficial page →

Offensive Security Certified Professional

Hands-on penetration testing — exploitation, privilege escalation, AD attacks.

OSEEExpert·OffSecOfficial page →

Offensive Security Exploitation Expert

Offensive Security Exploitation Expert

OSWAProfessional·OffSecOfficial page →

Offensive Security Web Assessor

Offensive Security Web Assessor

OSWEExpert·OffSecOfficial page →

Offensive Security Web Expert

Advanced web application exploitation — whitebox review, vulnerability chain construction.

S-CSPLLeadership·SECOOfficial page →

SECO Secure Programming Certified Leader

SECO Secure Programming Certified Leader

S-SPFAssociate·SECOOfficial page →

SECO Secure Programming Foundation

SECO Secure Programming Foundation

SOG CAPProfessional·Mile2Official page →

SecOps Group Certified AppSec Practitioner

SecOps Group Certified AppSec Practitioner

SSAPProfessional·SANS/GIACOfficial page →

SANS Security Awareness Professional

SANS Security Awareness Professional

Also touched

CISSP-ISSAPExpert·ISC2Official page →

CISSP Information Systems Security Architecture Professional

Architecture concentration on top of CISSP — trust boundaries, identity / crypto / network composition, defense-in-depth design.

GPENProfessional·GIAC / SANSOfficial page →

GIAC Penetration Tester

Penetration testing methodology + documentation.

GSECAssociate·GIAC / SANSOfficial page →

GIAC Security Essentials

Broad defender fundamentals. Often paired with SANS SEC401.

Security+Entry·CompTIAOfficial page →

CompTIA Security+

Broad entry-level knowledge across threats, ops, IAM, network, and crypto basics.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Cybersecurity

Test what you know about Application Security

42 questions available. Beginner to expert questions, scored against the global leaderboard.