The Changing Landscape of Software and Cybersecurity
Our 2024 report research began based on findings from our 2023 report. We explored factors that affect flaw introduction, remediation times, and security debt. We found that applications grow by about 40% year on year irrespective of their original size. As these apps grow and age, flaws accumulate, further driving up security debt.
This year we sought to figure out, “How risky is security debt really? Is it worth tackling? And if it’s worth tackling, what’s the best way to do it?”
A few landscape factors went into this thinking, too, starting with digital transformation. According to Harvard Business Review: “89% of large companies globally have a digital and AI transformation underway”. Speaking of AI, a GitHub study reports: “92% of U.S.-based developers are already using AI coding tools both in and outside of work.” While these advancements bring numerous benefits, they also introduce new cybersecurity challenges.
Studies1 have repeatedly shown that code developed by AI contains about the same percentage of security flaws as that generated by humans. So, while AI may accelerate code velocity, it’s likely to also accelerate the introduction of new flaws.
This need for speed and innovation has led to the potential for an even greater accumulation of security debt, where flaws remain unfixed for extended periods – but to what extent does this accumulation lead to risk? The key findings are even more than we bargained for.
Unveiling the Key Findings
For the purposes of the report, we are defining security debt as flaws that remain unremediated for over one year. Different organizations will have different standards for what constitutes debt, but, for the purposes of analysis, it’s more straightforward if we draw a single line and stick with it.
The State of Software Security 2024 report reveals that security debt exists in 42% of applications and a staggering 71% of organizations. Even more concerning is the fact that 46% of organizations have persistent, high-severity flaws that constitute 'critical' security debt. These vulnerabilities pose a significant risk to businesses, as we define severity as the potential impact on confidentiality, integrity, and availability.
Securing the Software Supply Chain: The Role of Third-Party Code
Where does all this security debt live? One of the major contributors to security debt is the use of third-party code from open-source libraries. Our research shows that approximately 70% of applications contain flaws in third-party code. Fixing these vulnerabilities takes organizations 50% longer than fixing first-party flaws, with half of the known open-source flaws remaining unresolved for eleven months.
For this reason, Veracode just announced a unified Integrated Development Environment (IDE) Plugin, combining Static Analysis (SAST) – for first party code – and Software Composition Analysis (SCA) – for third-party code. We’re making it easy for developers to find and fix vulnerabilities in the code they write and the code they borrow without having to leave the environment where they work.
The Staggering Impact of Flaw Remediation Speed
The report highlights a positive trend: high-severity security flaws in applications have decreased by half since 2016. This indicates progress in software security practices, and for that we applaud our customers. So, what actions do the leaders take to achieve these results?
Our analysis reinforced the importance of speed in flaw remediation. Development teams that address flaws promptly can reduce critical security debt by a remarkable 75%. By fixing vulnerabilities quickly, these teams build habits and muscle memory around fixing security flaws, significantly enhancing their security posture and reducing the prevalence of security debt in their applications.
The Way Forward: Integration and Prioritization
The State of Software Security 2024 report serves as a wake-up call for organizations to address their security debt head-on. Our analysis shows that not every organization is applying its finite remediation capacity in the most effective way. It’s crucial to allocate resources and sustain programs to eliminate critical security debt, ensuring maximum risk reduction.
Say your application team allocates enough capacity to fix 3% of known security flaws per month. Given that limitation, you’d want to prioritize the flaws constituting critical security debt before, say, the non-critical security debt. For a team with higher capacity, you might choose to pursue the critical non-debt or non-critical debt next. Either way, it’s important to have a prioritization strategy so that developer time is used in the most impactful way.
The Role of AI in Security Debt Reduction
Imagine someone trying to scoop water out of a boat to keep it from sinking, but there’s water coming in more quickly than they can bail it out. That’s what we’re getting at with remediation trends in this report.
While AI presents challenges to cybersecurity, it also presents a new frontier in addressing it. Veracode's AI-driven remediation tool, Veracode Fix, can address many Common Weakness Enumeration (CWE) categories with severity ratings ranging from medium to very high. This innovative approach, leveraging a curated set of reference patches from our security research team, enables organizations to proactively reduce security debt and strengthen their software security posture.
Diving Deeper into the State of Software Security 2024
The State of Software Security 2024 report provides valuable insights into the challenges posed by security debt and offers actionable recommendations for organizations. It’s a call to action for businesses to prioritize flaw remediation, focus on third-party code security, and adopt efficient development practices. Together, we can tackle the rising tide of security debt and build a more secure digital future.
To access the full State of Software Security 2024 report and gain deeper insights into the findings and recommendations, you can download your free copy here. Let us join forces to address security debt and enhance the overall state of software security across the board.