Report 2024 State of App Security Report
Report 2024 State of App Security Report
State of
Application
Security
Report
CrowdStrike 2024 State of Application Security Report 2
Table of Contents
Executive Summary 3
Key Findings 4
Conclusion 13
Appendix 14
Methodology 14
Survey Demographics 15
About CrowdStrike 16
Executive Summary
CrowdStrike 2024 State of Application Security Report 3
Executive Summary
Application security is the practice of protecting and securing applications throughout the software
development life cycle. As organizations shift their focus to driving revenue through software, application
security (AppSec) is becoming one of the most essential forms of security for modern enterprises to invest in.
Beyond generating revenue, software is also the backbone of the customer experience and is vital to
creating a respected brand. In short, applications run the world.
At the same time, the attack surface is shifting to application and APIs from classic infrastructure configuration
and permissions. Eight out of the top 10 data breaches of 2023 were related to application attack surfaces.1
These eight breaches alone are estimated to have exposed around 1.7 billion records. The staggering number
of records exposed proves that the status quo in application security isn’t enough. But before we can develop
the next generation of preventive and remediative AppSec solutions, we need to understand the predominant
challenges facing those on the front lines. Much like developing a vaccine or an antiviral, we need some data to
figure out if we’re addressing the most critical issues. Which problems are we trying to solve? What’s really going
on in application security teams? What are their greatest challenges? How are they doing their jobs today?
This report synthesizes data collected from a survey of application security professionals to reflect the current
state of application security. Here are the key findings:
1. More frequent deployments mean more languages to manage.
Organizations that deploy 1x/day or more use 5+ programming languages.
2. Teams use manual processes to inventory and catalog apps and APIs.
74% rely on documentation, and 68% rely on spreadsheets.
3. Only 54% of major code changes go through full security reviews.
22% review a quarter or less.
4. Traditional security reviews are time-consuming and expensive.
81% report that security reviews take longer than one business day, and 35%
say that security reviews take longer than three business days.
5. Security teams are using multiple tools.
90% use 3+ tools to detect and prioritize application vulnerabilities and threat.
6. Prioritizing what to fix first is a top challenge.
61% of AppSec professionals cite it as their top challenge working with developers.
7. Remediation is slow.
70% of critical issues take 12 hours or more to resolve.
8. Different-sized organizations have differing views on application security responsibility & accountability.
Smaller orgs (100-999 employees) see the CTO (22%) as most responsible; larger orgs (1,000 employees
or more) view AppSec teams (23%) and DevSecOps (22%) as most responsible.
1
Source: According to industry data, List of Data Breaches and Cyber Attacks in 2023 by IT Governance looking at data
breaches by the total number of records impacted.
CrowdStrike 2024 State of Application Security Report 4
Key Findings
Frequent Deployments
Mean More Programming
Languages to Manage
Continuous integration and continuous delivery (CI/CD) Frequent Deployers
became mainstream in 2011 alongside the release of Jenkins. (once a day or more)
With each passing year, software teams are empowered to
5.41 languages
push code into the world faster than before.
Companies eager to quickly produce software features allow
development teams to choose the programming language for
each project. As the number of software projects, the number
of development teams and the frequency of deployment
Semi-Frequent
increase, so does the number of programming languages used
Deployers
within an organization.
(once a week to a
Programming language sprawl complicates the job of few times a week)
application security professionals, as security teams must
3.78 languages
learn secure coding paradigms in multiple programming
Less Frequent
languages. Furthermore, they must find tools that support each
Deployers
coding language used internally.
(a few times a
month or less)
3.39 languages
CrowdStrike 2024 State of Application Security Report 5
Key Findings
CMDB 54%
CrowdStrike 2024 State of Application Security Report 6
Key Findings
Percentage of Respondents
Full Security Reviews 20%
If the crew on your next flight decided to skip the standard 15%
preflight checks because they had already covered their quota
for the day, would you feel safe? Probably not. The same goes 22% 22% 21%
10%
for code.
13%
Survey respondents estimated that, on average, 54% of major 5% 11% 11%
code changes undergo a full security review before deploying
to production. 0%
When looking at the breakdown of responses, 22% report 10% or less 11-24% 25-49% 50-74% 75-99% 100%
reviewing 50-74% of code changes, 22% review 25-49% of
code changes and 22% review 24% or fewer code changes. Code Coverage
50 %
54 %
median mean
CrowdStrike 2024 State of Application Security Report 7
Key Findings
10
median
16.5
Number of Individuals Involved in Security Reviews
Interestingly, 81% of the respondents indicate that a Despite taking significant time to complete and involving
security review takes more than one business day, with 35% saying several individuals, organizations reported conducting a
it takes more than three business days. Here’s a full breakdown of median of four security reviews per week, with 21% doing
how long security reviews take across the survey sample. 11 or more each week.
46%
29% 29% 21%
19% 5% 1% 16% 13% 11% 10%
1 day 1 -3 3-5 1-2 More than 1-2 3-4 5-6 7-10 11-24 25+
or less days days weeks 2 weeks
For organizations deploying frequently, security cannot be
a bottleneck. In fact, DORA metrics identify elite DevOps
performers as organizations with change lead times of
Traditional security reviews are even more resource-depleting due to
one hour or less.2 As an industry, if we are measuring
the number of people participating in them. Survey data shows that
security reviews in days – not hours – then there is
10 is the median number of individuals involved in a security review.
opportunity for improvement.
2
https://cloud.google.com/blog/products/devops-sre/using-the-four-keys-to-measure-
your-devops-performance
CrowdStrike 2024 State of Application Security Report 8
Key Findings
Correlating alerts
29% 27%
among multiple tools
Administering/
55%
17% managing tools
11% 10% 6% Getting full visibility 53%
into applications and
1-2 3-4 5-6 7-10 11-24 25+ APIs
57%
61%
55% 52% 52% 51%
36%
30% 32% 1% 2% 1% 1% 0% 1%
24% 20%
17% 19%
12% 14% 9% 10%
4% 4%
12 hours 12-24 1-3 3-7 7-14 14-30 31-60 61
or less days Unsure
hours days days days days days+
Critical
High
CrowdStrike 2024 State of Application Security Report 12
Key Findings
Not sure
Conclusion
This research provides insight into the greatest challenges organizations face
in securing their applications and how current application security practices
affect their business operations.
The data is clear: Applications and APIs are not secure enough. Organizations
must rethink their approach to application security. Relying on manual
processes slows down security and drives up cost. Traditional security reviews
are time-consuming and costly. Security teams juggle multiple individual
security tools — and even with those tools, many share the common challenge
of prioritizing which issues to fix first.
As adversaries evolve their techniques and operate with greater speed, it is
imperative that organizations strengthen their application security posture.
Fortunately, new technologies have emerged to address these common
challenges. Application security posture management (ASPM) provides full
visibility into deployed applications, continuously updates the application bill of
materials, automates many aspects of traditional security reviews, and triages
and prioritizes application vulnerabilities based on risk and exploitability. ASPM
tools help organizations scale their application security so they can build
strong, secure applications and prevent breaches.
CrowdStrike 2024 State of Application Security Report 14
Appendix
Appendix
Methodology
CrowdStrike’s Application Security Research Team developed a set of 31
questions to better understand the current state of application security and the
specific pains that companies are experiencing when securing their applications.
This report features insights from 400 U.S.-based security professionals across a
variety of industries and company sizes.
The survey was conducted in July 2023. The sample was provided by
Sago, a research panel company. Panel respondents were invited to take the
survey via email invitation and were incentivized to participate via the panel’s
established points program.
Survey Demographics
CrowdStrike 2024 State of Application Security Report 15
Appendix
100-199
4% 200-499
This section describes the survey population, 9%
Industry
Once per 5%
retail/eCommerce, manufacturing, professional services month Retail and
6% eCommerce
and a handful of other industries. 16%
Multiple
times
Deployment Velocity per day
A few 19%
times
When asked how frequently their organizations release a month
18%
application updates, 23% of the respondents indicated Once a day
17%
they push updates multiple times per week, and 19% said Once a
they push updates multiple times per day. week
12%
Deployment
Velocity
A few times
a week
23%
CrowdStrike 2024 State of Application Security Report 16
About CrowdStrike
About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has
redefined modern security with the world’s most advanced cloud-native
platform for protecting critical areas of enterprise risk — endpoints and
cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the
CrowdStrike Falcon® platform leverages real-time indicators of attack,
threat intelligence, evolving adversary tradecraft and enriched telemetry
from across the enterprise to deliver hyper-accurate detections,
automated protection and remediation, elite threat hunting and
prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture,
the Falcon platform delivers rapid and scalable deployment, superior
protection and performance, reduced complexity and immediate
time-to-value.