Web applications need special care and attention. This is a technology with which it is very easy to establish vulnerabilities that can be exploited easily.
Application security
Conducting a web application inventory
Understanding what web applications your organization has in its inventory is very important. Early in this chapter, we discussed the importance of developing a complete inventory so that we could better protect our environment. It will be very difficult to maintain an effective application security program without having detailed knowledge of the applications implemented throughout your organization. You should strive to answer questions such as:
- How many total applications are in the organization?
- What programming...