Netsparker security researcher Sven Morgenroth was interviewed on Application Security Weekly #60 to discuss how to build applications that are secure by default, so that some of the most common vulnerabilities are automatically avoided.
Sven Morgenroth, a security researcher at Netsparker, was interviewed by Mike Shema for Application Security Weekly #60 on May 6, 2019. Matt Alderman – CEO of Security Weekly – and John Kinsella also joined the conversation.The general theme of the interview was about securing our web applications. Sven talked about how confident we can be about the security of web applications, and how we can make it easier to build applications that avoid the vulnerabilities listed in the OWASP Top 10 by using secure defaults.In this context, 'secure by default' means that web application security vendors and their development teams should make it as difficult as possible for developers to use insecure techniques and coding styles, by encouraging the default use of secure alternatives. This sometimes means they aren’t necessarily the most developer-friendly settings, but developers can still choose to opt out or reduce their security configurations, even though this should be harder than using the default configuration and should contain clear warnings.
In an in depth conversation, Sven made the following points:
For more thoughts on what it means to be secure by default, see Netsparker CEO Ferruh Mavituna’s blog post on Why Framework Choice Matters in Web Application Security and How Netsparker Can Help You Ensure Your Systems Are Secure by Default.