Featured
America in motion Executive leadership hub - What’s important to the C-suite? Menu Capabilities Capabilities Audit and Assurance Alliances and ecosystems Artificial Intelligence (AI) Board governance issues Consulting Cybersecurity, Risk and Regulatory Deals Digital assets and crypto Digital assurance and transparency Engineering & AI Enterprise Strategy Financial Markets & Real Estate Finance and Accounting Financial statement audit Front Office Managed Services Metaverse Operations PwC Private Risk Modeling Services Sustainability and ESG Tax services Workforce All capabilities Menu Capabilities Audit and Assurance Menu Capabilities Alliances and ecosystems Adobe Amazon Web Services Google Guidewire Microsoft Oracle Salesforce SAP Workday All alliances Menu Capabilities Artificial Intelligence (AI) Menu Capabilities Board governance issues Menu Capabilities Consulting Menu Capabilities Cybersecurity, Risk and Regulatory Menu Capabilities Deals Menu Capabilities Digital assets and crypto Menu Capabilities Digital assurance and transparency Menu Capabilities Engineering & AI Menu Capabilities Enterprise Strategy Menu Capabilities Financial Markets & Real Estate Menu Capabilities Finance and Accounting Menu Capabilities Financial statement audit Menu Capabilities Front Office Menu Capabilities Managed Services Menu Capabilities Metaverse Menu Capabilities Operations Menu Capabilities PwC Private Family enterprises Law firms Private equity and portfolio companies Ultra high net worth individuals US inbounds Menu Capabilities Risk Modeling Services Menu Capabilities Sustainability and ESG ESG reporting Sustainability strategy Sustainable technology and digital Menu Capabilities Tax services Menu Capabilities Workforce Menu Capabilities All capabilities Menu Industries Industries Aerospace and defense Asset and wealth management Automotive Banking and capital markets Chemicals Consumer markets Consumer packaged goods Energy Energy and industrials Engineering and construction Financial services Gaming Health industries Health services Hospitality and leisure Industrial manufacturing Insurance Media Medical technology Pharmaceutical and life sciences Power and utilities Private equity Real estate Restaurants, wholesale and agriculture Retail Space Sports Technology Technology, media and telecommunications Telecommunications Travel, transportation and logistics Menu Industries Aerospace and defense Menu Industries Asset and wealth management Menu Industries Automotive Menu Industries Banking and capital markets Menu Industries Chemicals Menu Industries Consumer markets Menu Industries Consumer packaged goods Menu Industries Energy Menu Industries Energy and industrials Menu Industries Engineering and construction Menu Industries Financial services Menu Industries Gaming Menu Industries Health industries Menu Industries Health services Menu Industries Hospitality and leisure Menu Industries Industrial manufacturing Menu Industries Insurance Menu Industries Media Menu Industries Medical technology Menu Industries Pharmaceutical and life sciences Menu Industries Power and utilities Menu Industries Private equity Menu Industries Real estate Menu Industries Restaurants, wholesale and agriculture Menu Industries Retail Menu Industries Space Menu Industries Sports Menu Industries Technology Menu Industries Technology, media and telecommunications Menu Industries Telecommunications Menu Industries Travel, transportation and logistics Menu Technology Technology Alliances and ecosystems Delivery platforms Emerging technology Engineering & AI Products Tech-enabled services Tech Effect Menu Technology Alliances and ecosystems Adobe Amazon Web Services Google Cloud Guidewire Microsoft Oracle Salesforce SAP Workday Menu Technology Delivery platforms Concourse Sightline Menu Technology Emerging technology Artificial Intelligence (AI) Digital assets and crypto Metaverse Responsible AI Web3 Menu Technology Engineering & AI Menu Technology Products Analytics Foundation Beacon Bookkeeping Connect Connected Solutions Enterprise Control Investor Survey Model Edge Next Level HR Profit Seeker Ready Assess Saratoga Risk Link View all products Menu Technology Tech-enabled services Agile Commerce Carbon Ledger Culture Thumbprint Enhanced insurance analytics for Salesforce ESG Geospatial Climate Intelligence (GCI) Insights to Enablement Market Advantage Payer Advocacy Center Ready Command Shovel Ready Menu Technology Tech Effect Menu About us About us Alumni Analyst relations Investing in our people Newsroom Offices Our leadership Purpose and values Menu About us Alumni Join the PwC Alumni Network Meet our alumni Menu About us Analyst relations Menu About us Investing in our people Menu About us Newsroom Menu About us Offices Menu About us Our leadership Menu About us Purpose and values Be Well, Work Well Environmental sustainability Inclusion Social impactFeatured
Tech Effect Menu Careers Careers Why PwC Entry Level Careers Experienced Careers University Relations Menu Careers Why PwC Benefits & Compensation The PwC Professional US Careers Podcast hub Menu Careers Entry Level Careers Search opportunities Recruiting process Student Development Programs Advance Internship Military and Veterans Student programs quiz Menu Careers Experienced Careers Search opportunities Contract opportunities Alumni Careers Military and Veterans Menu Careers University Relations University Relations Faculty NewsletterFeatured
Shared success benefits Loading ResultsNo Match Found
View All Results An agile approach to application security with Microsoft Defender Copy link Link copied to clipboard Summary Securing applications often requires a shift in mindset, tooling and ways of working. Developers should take an agile approach to application security. Developers can work hand in hand with security teams using a cyber-risk-based approach and automated tools. Microsoft Defender, a cloud-native application protection platform, can help prioritize risks and prevent threats. Just when you’d thought it was safe to host your enterprise applications in the cloud, your cloud environment changes. Now, you should change how you secure those apps, with an approach every bit as agile as the process your developers used to create them. Application security can be easy to overlook, but critical to maintain. If your company depends on its apps to generate the lion’s share of revenues, your application security can help protect more than a technology. It can also safeguard the very core of your business. As you move your apps away from your cloud service provider’s (CSP) infrastructure-as-a-service (IaaS) space to a platform-as-a-service (PaaS) environment, nimbly adjusting how you secure them can be key to your business’s success. In the process, the third-party applications you use will also need rigorous scrutiny, as their developers often face the same security challenges that yours do — challenges that could compromise your systems, networks and data. The development dilemma PaaS has become a popular cloud alternative for the convenience it can offer, especially to development teams. They can design, develop, build and test apps and updates directly in the cloud, using software the CSP provides. Increasingly, these platforms can push out updates, so users don’t have to. But moving to PaaS comes with a caveat. Developing your apps on a cloud platform can make your developers primarily responsible for securing your apps. Are they ready for this responsibility? Developers, after all, thrive in a fast-paced work environment, driven by the need for speed and agility. Security may take a back seat until the design process is underway, or even later. Then, they may tack security onto the finished app using APIs or code from libraries or containers, which they can obtain from security staff.Application security isn’t a one-size-fits-all proposition. The plug-and-play approach can be risky if the added code doesn’t quite fit or if it’s improperly placed into the application.
The consequences of not “shifting left” on security — not accounting for it in the earliest planning stages and weaving it into the design — could be serious, as some recent high-profile breaches show. Still, developers trained in agile processes can take an agile approach to application security, in tandem with security teams grounded in a cyber-risk-based approach and equipped with automated tools. When vulnerabilities creep in, cybercriminals can follow Cybercriminals are attacking enterprise apps with gusto. Web application breaches made up more than 60 percent of security incidents in 2022, according to one study. Though designed to serve consumers and increase business revenues, apps also increase the risk of security incidents. In the Apache Log4j breach of late 2021, hackers exploited misconfigured code to infiltrate and gain remote control of Log4j users’ systems. The mistake reportedly put hundreds of millions of computing devices at risk. In addition to coding errors, we also see deficiencies in enterprise workload protection, including identity and access management. It’s quite common for developers to have more access privileges than they need. So-called superusers can literally go almost anywhere and do almost anything in the system, increasing the chance of misuse and even abuse. Someone could mistakenly or even intentionally approve a financial transaction that shouldn’t be authorized, at great cost to the business, or they could release customer personal data. And if bad actors were to get hold of a superuser’s login credentials (via a phishing email, for example), they might get carte blanche access to your systems, networks and data. 2024 Global Digital Trust Insights Putting security at the epicenter of innovation A playbook for executives who are ready to advance their companies' cybersecurity strategies. Learn more Then there are the software-as-a-service (SaaS) apps your organization uses, produced by others. The Cloud Security Alliance (CSA) reports that, on average, businesses have about a hundred applications in their technology stack. Some have many more. At least one enterprise reported using more than 5,000 applications. And if there are security flaws in those applications? They could be treacherous to your enterprise. The SolarWinds hack, in which attackers inserted malicious code into software updates that gave them access to 100 companies and several government agencies, succeeded in part because update recipients trusted that those updates did not have bad code. More than half of respondents to the CSA survey said they check their third-party applications for coding errors and misconfigurations only once a month or less. Five percent said they never check. And when they find misconfigurations? About a quarter take a week or more to remedy them, often giving cybercriminals more time to exploit the vulnerability. Bar chart titled App security is a cyber investment priority in 2024, second only to cloud security Cyber security investment priorities over the next 12 months Cloud security % Application security % IoT security % Network security % OT security % Managed security services % API security % Security operations % Identity and access management % Security awareness training and cross training security operations % Endpoint security % Mobile security % Unsure % Source: PwC's Digital Trust Insights Surveys, Final Results, August 2023.Q14a. Which of the following investments are you prioritising when allocating your organisation’s cyber budget in the next 12 months? (Ranked in top three) Base: IT respondents: 1919 Modern app security: A two-pronged approach There’s no such thing as perfect security. Trying to achieve it, you’re more likely to restrict your applications’ usefulness. And the money you’d spend would almost certainly exceed your return. But you can take application security actions that can work well in today’s fast-paced, speed-driven, cloud-based, ever-changing digital environment, be it IaaS, PaaS or SaaS. We recommend an overlapping approach rooted in risk management and then automated by technologies. 1. Know and manage your application security risks. Do you know which applications your business uses? Do you know what open source software (OSS) is used in your applications? What about unauthorized, “jailbreak” apps on your enterprise devices? Assessing the risk that each poses can help you to focus your energies on monitoring and securing more critical in terms of likelihood and impact of breach. Also, how sensitive is the data your third-party applications contain? Unlike with your company-generated applications, you don’t have access to these applications' underlying database, so you will need to place your own controls on access and actions you’ll allow. Could someone take a screenshot and send it outside the company? And what does your CSP offer in terms of security? The shared responsibility model — cloud providers can help secure the infrastructure but users should protect the data they place there — is widely understood by now, but different CSPs offer different security options. Knowing what’s available to you there can help you know where you need to supplement. Knowing who has superuser and other high-level access to your applications, whether they need that access, and for how long they need that access can also be essential to strong application security. How are you monitoring their activities for anomalies or risky moves? What kinds of identity and access management controls do you have in place, and where should you strengthen them? 2. Select tools can help you measure, maintain and monitor. Clouds change, but so do technologies. For application security in the cloud, cloud-native application protection platforms (CNAPP) are gaining traction for their risk-to-response and multi-cloud-management abilities. To help properly secure your applications in the cloud, be it IaaS, PaaS, SaaS or a hybrid environment, you’ll likely need to not only amend your processes — by switching, for instance, from a DevOps model to DevSecOps, in which security can be an integral part of every project — but also reconsider your architecture. In the past, your teams might have checked your IaaS buckets to identify if they were properly configured, or they might have relied on traditional agents to help monitor your workloads. But these approaches don’t work with cloud-native apps in the PaaS cloud. With cloud-native, you can work to identify that your application’s database isn’t publicly available, and that it has in place proper identity, logging and monitoring controls so you can protect your workloads. Streamlining security with PwC and Microsoft Microsoft Defender for Cloud, a CNAPP solution, can help you prioritize your risks, check for misconfigurations and remediate problems quicker. Defender uses data can help provide context and help you anticipate your threats. It also can automatically check for misconfigurations and controls, and help you prevent, detect and respond to threats. Working with Microsoft, PwC has developed a security control framework that can help your developers and security teams work together more smoothly so you can secure your enterprise applications. Traditionally, we’ve offered this framework for use with IaaS-based applications, but we’re expanding the service for use with PaaS-hosted, cloud-native apps. We can help guide you as to which Microsoft Azure services you may wish to use and which security controls can help you enable at the platform level. For many of the platform services that you use, Microsoft can help provide a process or solution for visibility into identities and roles, accesses and permission “drift,” or individuals accumulating permissions that they no longer need. We can also help your security teams create security-as-code or policy-as-code templates for your development teams to use as they stand up a PaaS project within Microsoft Azure. That way, developers can work at their usual fast pace, confident that their work is protected, and Defender can help monitor for suspicious activity or misconfigurations, allowing you to take timely remediation actions and helping reduce the risk of vulnerability exploitation. The bottom line Securing applications often requires a shift in mindset, in tooling and in ways of working. Developers trained in agile processes should take an agile approach to application security. Developers can work hand in hand with security teams, grounded in a cyber-risk-based approach and equipped with automated, modern, highly effective tools. As some recent high-profile breaches show, not “shifting left” on security — not accounting for it in the earliest planning stages and weaving it into the design of applications — can lead to serious consequences. Be cyber-ready for tomorrow See how PwC and Microsoft can help strengthen threat-detection capabilities. Learn more Next and previous component will go here Our insights. Your choices. Subscribe here Follow us Audit and assurance services Consulting Tax services Newsroom Alumni US offices Contact us © 2017 - 2026 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see http://pwc.zhutiblog.com/com/structure for further details. Privacy Data Privacy Framework Cookie info Legal Terms and conditions Site provider Site map Your Privacy Choices
智能索引记录
-
2026-02-27 19:31:28
数码科技
成功
标题:白胡子科技后台
简介:白胡子科技
-
2026-02-28 01:25:43
综合导航
成功
标题:京东(JD.COM)-正品低价、品质保障、配送及时、轻松购物!
简介:京东JD.COM-专业的综合网上购物商城,为您提供正品低价的购物选择、优质便捷的服务体验。商品来自全球数十万品牌商家,囊
-
2026-03-01 13:28:31
综合导航
成功
标题:Arlen Eugene Mann - Classic Hits 100.7 KLOG
简介:100.7 KLOG - Classic Hits, Local News and Sports
-
2026-03-01 00:16:27
教育培训
成功
标题:(优选)五年级的作文
简介:在日常学习、工作和生活中,大家都写过作文吧,借助作文可以提高我们的语言组织能力。那么你有了解过作文吗?以下是小编整理的五
-
2026-02-28 09:36:25
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-03-01 13:29:07
教育培训
成功
标题:【热门】除夕的作文800字集锦九篇
简介:在学习、工作乃至生活中,大家对作文都再熟悉不过了吧,根据写作命题的特点,作文可以分为命题作文和非命题作文。你知道作文怎样
-
2026-03-01 13:18:05
教育培训
成功
标题:有关二年级优秀作文锦集八篇
简介:在日复一日的学习、工作或生活中,大家都跟作文打过交道吧,作文根据体裁的不同可以分为记叙文、说明文、应用文、议论文。如何写
-
2026-03-01 14:17:24
图片素材
成功
标题:五年级想象作文600字 五年级600字想象作文大全-作文网
简介:作文网优秀五年级想象600字作文大全,包含五年级想象600字作文素材,五年级想象600字作文题目、美文范文,作文网原创名
-
2026-02-27 20:53:23
综合导航
成功
标题:Weaver2. World English Historical Dictionary
简介:Weaver2. World English Historical Dictionary
-
2026-03-01 00:25:31
图片素材
成功
标题:环境恶化的作文 描写环境恶化的作文 关于环境恶化的作文 素材-作文网
简介:作文网精选关于环境恶化的作文,包含环境恶化的作文素材,关于环境恶化的作文题目,以环境恶化为话题的作文大全,作文网原创名师
-
2026-03-01 00:36:17
教育培训
成功
标题:四年级作文300字
简介:在日常生活或是工作学习中,大家都不可避免地要接触到作文吧,作文是人们以书面形式表情达意的言语活动。如何写一篇有思想、有文
-
2026-02-27 20:56:42
新闻资讯
成功
标题:602《女神联盟》174服5月10日13点火爆开启 - 新闻公告 - 602游戏平台 - 做玩家喜爱、信任的游戏平台!cccS
简介:602《女神联盟》174服5月10日13点火爆开启
-
2026-02-28 00:49:28
综合导航
成功
标题:AI智能索引
简介:Auf der Suche nach einem Ausbildungsplatz? Wir geben euch im
-
2026-03-01 14:10:12
综合导航
成功
标题:Australia-Based Proximity Acquired by - SPA
简介:Proximity is Market Leader in Consulting, Legal, and Commerc
-
2026-03-01 13:48:12
综合导航
成功
标题:Compliance, ESG & Governance Software EQS Group
简介:The EU-native governance infrastructure for global enterpris
-
2026-02-27 20:10:34
综合导航
成功
标题:ILSC Language School Blog Travel and Study (4)
简介:Travel and Study Blogs to learn English at ILSC Language S
-
2026-02-28 01:34:59
综合导航
成功
标题:NVE Corp- AD320-00E: 2.8 mT Digital Switch, MSOP -
简介:This is AD320-00E: 2.8 mT Digital Switch, MSOP from Magnetic
-
2026-03-01 10:39:25
教育培训
成功
标题:实用的二年级的春天作文合集七篇
简介:无论在学习、工作或是生活中,大家或多或少都会接触过作文吧,作文是人们把记忆中所存储的有关知识、经验和思想用书面形式表达出
-
2026-03-01 03:20:54
综合导航
成功
标题:MP Men's Tempo Stretch Woven Shorts - Black
简介:Shop MP Men
-
2026-03-01 04:37:14
综合导航
成功
标题:等待_900字
简介:人生有很多个站口,为了迎接那辆只属于自己的巴士,我们学会了等待。刚进入陌生考场的我们,手足间有些无措,我们拿着曾引来无数
-
2026-02-27 19:53:11
综合导航
成功
标题:Parabolic SAR (Parabolic SAR) XS
简介:Parabolic SAR، المعروف أيضًا بـ
-
2026-02-28 10:26:18
综合导航
成功
标题:Samsung Galaxy Note 20 Ultra looks GORGEOUS in these newest images T3
简介:More leaks in the run up to Unpacked give us a more accurate
-
2026-03-01 00:13:48
综合导航
成功
标题:Leading Materials Testing Equipment Provider ELE International
简介:ELE International is the leading materials testing equipment
-
2026-03-01 13:21:52
综合导航
成功
标题:Pakket met TNT vanuit Nederland naar België verzenden TNT Netherlands
简介:Een pakket van Nederland naar België verzenden? Gebruik TNT
-
2026-02-28 10:38:16
视频影音
成功
标题:送给月亮的情书第102集红豆剧场_在线播放[高清流畅]_爽文短剧
简介:爽文短剧_送给月亮的情书剧情介绍:送给月亮的情书是由内详执导,内详等人主演的,于2025年上映,该剧情讲述的是@好男人@
-
2026-03-01 10:28:14
图片素材
成功
标题:永不忘的作文550字 描写永不忘的作文 关于永不忘的作文-作文网
简介:作文网精选关于永不忘的550字作文,包含永不忘的作文素材,关于永不忘的作文题目,以永不忘为话题的550字作文大全,作文网
-
2026-03-01 10:22:30
美食菜谱
成功
标题:NS6.com
简介:NS6.com 让您在一个链接中分享您所有的互联网内容、文章、食谱、网站、作品集、社交媒体帖子等等。
-
2026-02-27 19:52:27
综合导航
成功
标题:è±¹é±çæ¼é³_è±¹é±çææ_è±¹é±çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½è±¹é±é¢é,ä»ç»è±¹é±,è±¹é±çæ¼é³,è±¹é±æ¯
-
2026-03-01 03:38:23
教育培训
成功
标题:实用的三年级作文集合3篇
简介:在学习、工作、生活中,大家都写过作文吧,写作文是培养人们的观察力、联想力、想象力、思考力和记忆力的重要手段。怎么写作文才
-
2026-02-27 19:30:29
综合导航
成功
标题:Acetate Pinstripe Fitted Vest Cue
简介:Nia Acetate polyester blend fabric Fitted Waist length Colla