­
Key Metrics for the Application Security Testing (AST) - All Articles - CISO Platform

Key Metrics for the Application Security Testing (AST)

Application Security Testing ( AST ) are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls into following categories:
  • Static Application Security Testing (SAST): Static application security testing tools analyzes the application source code to determine if vulnerabilities exist. IT is also referred to as White-box testing. SAST tools looks at the code before its compiled, so nothing is executed while testing applications code. This method helps in early identification of vulnerabilities thereby reducing the mean-time to production. S-AST tools can also be easily integrated with organizations Secure Development Life Cycle (SDLC) to further improve its effectiveness.
  • Dynamic Application security Testing (DAST): DAST tools are also referred to as Black box testing tools. They find potential vulnerabilities inside an application by trying to penetrate them in variety of ways, while the applications are running. They also do not require access to source code and binaries and can find business logic vulnerabilities and vulnerabilities in third-part software interfaces. They often complement the capabilities of S-AST tools, that’s why are often time used by organizations in addition to S-AST tools.
  • Interactive Application Security Testing (IAST): IAST is the mix of DAST and RASP, Run-time Application Security Protection, techniques. This approach analyzes application in the testing phase, using the RASP runtime agent and D-AST as an attack inducer. The agent, which is instrumented into the application runtime engine (e.g., into JVM), has insight into the application’s logic flow, data flow and configuration, monitors the test attacks initiated by the D-AST attack inducer, and then reports on the attacks that resulted (or might result) in an application’s exploit. I-AST reports help developers prioritize the vulnerability findings from dynamic scans, so that they can more effectively reduce risk while keeping up with production schedules.
  • Mobile Application Security Testing (Mobile AST): Mobile AST uses a combination of traditional SAST and D-AST and behavioral analysis using static and dynamic techniques to discover malicious or potentially risky actions the app may be taking unknown to the user (for example, activating the user’s address book or GPS)

Key Program Metrics:

# vulnerabilites in code over a period of time :
This includes bugs found through threat modeling and code reviews; by static analysis security testing (SAST), dynamic analysis security testing (DAST) and interactive application security testing (IAST) tools; and through pen testing and other testing.

Vulnerability density in a particular application :
The number of vulnerabilities divided by lines of code or some other proxy will give you vulnerability density, which makes it easier to compare risk in different systems, by technology platform or language and over time.

# vulnerabilities with high severity :
Evaluate how serious the vulnerabilities are by determining risk by likelihood (discoverability, exploitability, reproducibility) and impact. Standardize risk scores across tools and applications, using a scheme such as the Common Vulnerability Scoring System (CVSS), which ranks vulnerabilities from critical to low based on how easily a vulnerability can be exploited and its potential impact on data confidentiality, integrity and system availability.

Percentage of vulnerabilities fixed :
The percentage of total vulnerabilities, discovered through any means, fixed

Mean-time to repair :
How long did it take to fix the vulnerabilities? Or, to look at this data another way, how long, on average, did vulnerabilities stay open, especially serious vulnerabilities? What is your window of exposure?

 

Do let me know if you want us to add or modify any of the listed key use cases.

Check out the Application Security Testing (AST) market within Product comparison platform to get more information on these markets.

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee