{"id":15460,"date":"2026-01-13T11:19:17","date_gmt":"2026-01-13T11:19:17","guid":{"rendered":"https:\/\/newestek.com\/?p=15460"},"modified":"2026-01-13T11:19:17","modified_gmt":"2026-01-13T11:19:17","slug":"for-application-security-sca-sast-dast-and-mast-what-next","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15460","title":{"rendered":"For application security: SCA, SAST, DAST and MAST. What next?"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that never execute. DAST shrugs because the route to the vulnerable function is blocked. SCA floods the zone with CVEs that never touch a hot path. MAST scolds my mobile app for secrets I retired last quarter. These tools are still essential, yet they now form a baseline rather than a destination. The next chapter is not another \u201csilver bullet\u201d product; it is a shift toward posture, provenance and proof.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-large\"><\/figure>\n<p class=\"imageCredit\">Sunil Gentyala<\/p>\n<\/div>\n<p>Over the past year the community has admitted the obvious: the battleground is the software supply chain and the running system, not only pre\u2011release scans. OWASP\u2019s 2025 update elevated <a href=\"https:\/\/owasp.org\/Top10\/2025\/A03_2025-Software_Supply_Chain_Failures\/\">software supply chain failures<\/a> to A03, reframing vulnerable and outdated components as a systemic ecosystem risk that spans dependencies, build systems and distribution infrastructure (Endor Labs <a href=\"https:\/\/www.endorlabs.com\/learn\/owasp-top-10-adds-a03-2025-software-supply-chain-failures\">overview here<\/a>). In parallel, CISA pushed SBOM guidance forward with a 2025 draft that demands richer, machine\u2011readable metadata and emphasizes automation for scale.<\/p>\n<h2 class=\"wp-block-heading\" id=\"posture-provenance-and-proof-the-new-trinity\">Posture, provenance and proof: The new trinity<\/h2>\n<p>Application security posture management (ASPM) is the control plane that makes the old quartet useful again. Gartner\u2019s 2025 Innovation Insight described how ASPM connects scattered signals across the SDLC, enforces policy and prioritizes based on context, such as reachability and exposure in practice, which means pulling SAST, DAST, SCA, IaC and runtime findings into a single view, then filtering for the small subset that really matters.<\/p>\n<p>I prefer framing ASPM through a code to cloud lens because it mirrors how our systems actually work. The Wiz Academy guide lays out ASPM\u2019s core capabilities, unified visibility, risk prioritization, policy enforcement and stresses continuous discovery across development, build and deployment. The goal is to cut alert fatigue while connecting code issues to runtime impact <a href=\"https:\/\/www.wiz.io\/academy\/application-security-posture-management-aspm\">ASPM<\/a>. This aligns with Gartner\u2019s premise but adds practical detail about correlating repository signals, pipeline policies and cloud reality.<\/p>\n<p>Posture is the \u2018what.\u2019 Provenance is the \u2018how\u2019. The <a href=\"https:\/\/slsa.dev\/\">SLSA<\/a> framework gives us a shared vocabulary and verifiable controls to prove that artifacts were built by hardened, tamper\u2011resistant pipelines with signed attestations that downstream consumers can trust (OpenSSF <a href=\"https:\/\/openssf.org\/projects\/slsa\/\">overview here<\/a>). When I insist on SLSA Level 2 for most services and Level 3 for critical paths, I am not chasing compliance theater; I am buying integrity that survives audit and incident.<\/p>\n<p>Proof is where SBOMs finally grow up. Binding SBOM generation to the build that emits the deployable bits, signing them and validating at deploy time moves SBOMs from \u201cingredient lists\u201d to enforceable controls. The CNCF TAG\u2011Security best <a href=\"https:\/\/tag-security.cncf.io\/community\/working-groups\/supply-chain-security\/supply-chain-security-paper-v2\/Software_Supply_Chain_Practices_whitepaper_v2.pdf\">practices v2 paper<\/a> is my practical map, personas, VEX for exploitability, cryptographic verification to ensure tests actually ran, and prescriptive guidance for cloud\u2011native factories.<\/p>\n<p>Advisory: if your SBOM describes developer intent rather than what executes, you will miss the next recall. Generate SBOMs from the build that produced the binary, sign them, ingest VEX and gate deployments on verification.<\/p>\n<h2 class=\"wp-block-heading\" id=\"from-dashboards-to-decisions-aspm-in-practice\">From dashboards to decisions: ASPM in practice<\/h2>\n<p>A posture program is a set of habits, not just a platform. I start by unifying scanner outputs into a single risk register, but I refuse to triage in a vacuum. Findings must carry reachability evidence, data sensitivity tags and exposure context. That is where ASPM earns its keep. The Wiz Academy material underscores this code to cloud connection and shows how to reduce noise so developers see the few issues that block business rather than a wall of theoretical risk. Gartner\u2019s framing makes the case for adoption in regulated environments where fragmented signals undermine remediation velocity.<\/p>\n<p>Two implementation notes from my own programs. First, wire ASPM to owners. Every finding needs a resolver and an SLA, or it is just a report. Second, gate risky builds. Policy enforcement is not a dashboard; it is a decision. If an artifact lacks provenance or a VEX shows exploitability in a reachable path, it does not ship.<\/p>\n<p>Advisory: Keep one policy source of truth. If security policy lives in three tools, developers will ignore all three.<\/p>\n<h2 class=\"wp-block-heading\" id=\"supply-chain-rigor-without-theater\">Supply chain rigor without theater<\/h2>\n<p>Supply chain work can degrade into paperwork if we forget what matters. Integrity is the point. I keep SLSA simple. Level 2 quickly, Level 3 for critical paths. That means a hardened build service, isolated builds, signed provenance and a verified chain from source to artifact. \u00a0SBOMs become operational once they are machine-readable, signed and validated on deploy. <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2025-08\/2025_CISA_SBOM_Minimum_Elements.pdf\">CISA\u2019s<\/a> 2025 draft tightened expectations for fields, formats and automation, which I welcome because it makes procurement and incident response faster and cleaner.<\/p>\n<p>The <a href=\"https:\/\/www.cncf.io\/reports\/public-sector-software-supply-chain-whitepaper\/\">CNCF paper<\/a> fills in the gaps. It explains how to couple SBOMs with VEX, add cryptographic checks for pipeline steps, and treat developer infrastructure as part of the supply chain. That last point matters because attackers increasingly target repositories, CI settings and artifact registries, not just code dependencies. Public sector guidance from CNCF echoes the same priorities for government workloads, with concrete lessons from SolarWinds, Log4Shell and xz.<\/p>\n<p>Advisory: never accept a vendor SBOM without a signature and a provenance attestation. If they cannot prove how the software was built, your risk calculus is guesswork.<\/p>\n<h2 class=\"wp-block-heading\" id=\"runtime-reality-instruments-not-illusions\">Runtime reality: Instruments, not illusions<\/h2>\n<p>Prerelease testing is necessary but not sufficient. IAST instrumentation gives me runtime truth during QA, observing actual execution paths to reduce false positives and preserve developer context. In production, the mental model shifts to RASP, which blocks exploitation inside the application at the exact moment risky operations occur: SQL construction, OS exec, serialization, where WAFs cannot see. This is not a knock on WAFs; it is a recognition that network layer inspection and application layer introspection solve different problems.<\/p>\n<p>If you think perimeter controls are enough, two weeks in November 2025 should dispel that. CISA issued emergency guidance for Cisco ASA and FTD vulnerabilities (CVE\u20112025\u201120333, CVE\u20112025\u201120362) because agencies reported devices as \u201cpatched\u201d that were still on vulnerable trains. The directive prescribed minimum versions, forensic checks and timelines, and reminded everyone that all devices must be updated, not only Internet\u2011facing ones (CISA <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/cisa-identifies-ongoing-cyber-threats-cisco-asa-and-firepower-devices\">press release<\/a>).<\/p>\n<p>The lesson is portable: treat \u201cpatched\u201d as a state with proofs. Validate minimum release trains, verify fleet\u2011wide and decommission end\u2011of\u2011support gear. Pair perimeter controls with application\u2011layer sensors and container runtime protection because your workloads increasingly live in Kubernetes and managed platforms. <a href=\"https:\/\/www.mordorintelligence.com\/industry-reports\/kubernetes-market\">Market analyses<\/a> confirm the shift toward orchestrated, cloud\u2011native estates where consistent runtime policy is possible (CNCF trend post <a href=\"https:\/\/www.cncf.io\/blog\/2025\/01\/22\/kubernetes-in-2025-are-you-ready-for-these-top-5-trends-and-predictions\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>).<\/p>\n<p>Advisory: wire runtime telemetry to your TDIR practice. When RASP blocks an injection in production, that event should spawn code fixes, not just a closed alert.<\/p>\n<h2 class=\"wp-block-heading\" id=\"securing-ai-and-the-supply-chain-ecosystems\">Securing AI and the supply chain ecosystems<\/h2>\n<p>Among the nexts, AI is the most mercurial. NIST\u2019s final 2025 guidance on adversarial ML split threats across PredAI and GenAI and called out prompt injection in direct and indirect form as the dominant exploit in agentic systems where trusted instructions co mingle with untrusted data (<a href=\"https:\/\/www.ibm.com\/think\/insights\/ai-prompt-injection-nist-report\">Meritak Overview;<\/a> <a href=\"https:\/\/www.ibm.com\/think\/insights\/ai-prompt-injection-nist-report\">IBM explainer<\/a>). The U.S. AI Safety Institute published work on agent hijacking evaluations, which I treat as required red\u2011team reading for anyone delegating actions to tools (<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2025\/01\/technical-blog-strengthening-ai-agent-hijacking-evaluations\" target=\"_blank\" rel=\"noreferrer noopener\">NIST AISI blog<\/a>).<\/p>\n<p>For builders, the July 2024 NIST SP 800\u2011218A community profile extends SSDF into generative AI and dual-use foundation models. It covers threat modeling prompts, securing training data pipelines, isolating model operations and binding model documentation to secure development practices.<\/p>\n<p>At the language layer an unfashionable recommendation turned mainstream. In June 2025 NSA and CISA urged adoption of memory\u2011safe languages with pragmatic migration guidance for legacy estates\u2014start where it matters most, integrate incrementally and shield old modules behind hardened FFI (<a href=\"https:\/\/media.defense.gov\/2025\/Jun\/23\/2003742198\/-1\/-1\/0\/CSI_MEMORY_SAFE_LANGUAGES_REDUCING_VULNERABILITIES_IN_MODERN_SOFTWARE_DEVELOPMENT.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">NSA\/CISA CSI<\/a>).<\/p>\n<h2 class=\"wp-block-heading\" id=\"language-choices-that-erase-entire-bug-classes\">Language choices that erase entire bug classes<\/h2>\n<p>If you want to delete vulnerability classes, stop writing them. In June 2025, NSA and CISA published a joint CSI urging adoption of memory-safe languages with pragmatic migration guidance for legacy estates. Start where it matters, integrate incrementally and shield old modules behind hardened FFI. This is not academic posturing. Buffer overflows, use after free and data races erode resilience and cost real money. Memory-safe languages reduce those risks by design.<\/p>\n<p>Advisory: mandate memory-safe languages for net new development, plan migrations for high-risk modules and publish a runway with dates and metrics. Explain the why using NSA and CISA guidance, then measure the results.<\/p>\n<h2 class=\"wp-block-heading\" id=\"where-sca-sast-dast-and-mast-fit-now\">Where SCA, SAST, DAST and MAST fit now<\/h2>\n<p>They remain foundational when docked into a posture\u2011centric program.<\/p>\n<ul class=\"wp-block-list\">\n<li>SAST still catches design and implementation flaws, but I insist on reachability analysis and developer\u2011first remediation inside the IDE; feed SAST into ASPM for context so theoretical issues do not overwhelm real ones.<\/li>\n<li>DAST is indispensable for pre\u2011release exposure, yet I pair it with IAST to observe live code paths and reduce false positives.<\/li>\n<li>SCA moves beyond CVE lists when SBOM generation binds to builds and VEX cuts noise; CNCF best practices and CISA\u2019s 2025 SBOM draft describe how to do this well.<\/li>\n<li>MAST keeps mobile hardening honest, but I roll secret hygiene and secure storage checks into the same lifecycle controls used for server apps.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"leadership-advisory-what-i-implement-next\">Leadership advisory: what I implement next<\/h2>\n<p>This is the operating model I have shipped in regulated environments that cannot afford to be wrong.<\/p>\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>ASPM as control plane.<\/strong> Unify signals, deduplicate and rank by exploitability\u2014reachability, exposure, data sensitivity. Route ownership automatically and use policy gates on risky builds.<\/li>\n<li><strong>Supply chain rigor.<\/strong> Adopt SLSA levels, require signed SBOMs and attestations, and validate at deploy. No artifact without provenance, no deploy without verification.<\/li>\n<li><strong>Runtime protection.<\/strong> Embed RASP in application stacks, enforce container runtime controls and keep WAF at the edge. Wire events to your TDIR pipeline so blocking in production triggers fixes in code.<\/li>\n<li><strong>Secrets lifecycle and machine identities.<\/strong> Central vaulting, automated rotation, least privilege everywhere, mutual TLS for service\u2011to\u2011service authentication.<\/li>\n<li><strong>AI security program.<\/strong> Adopt NIST SP 800\u2011218A, red\u2011team agents for hijacking, enforce privilege separation and monitor outputs.<\/li>\n<li><strong>Language policy<\/strong>. Mandate memory\u2011safe languages for net\u2011new development, plan migrations for high\u2011risk modules and use NSA\/CISA\u2019s guidance to educate stakeholders.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2>\n<p>SCA, SAST, DAST and MAST remain the bedrock, but they are most effective when orchestrated by ASPM, proven by SLSA and SBOMs, and defended by runtime controls. Add AI-specific safeguards and memory\u2011safe languages, and you move from chasing findings to making decisions with confidence. That is my \u201cwhat next.\u201d<\/p>\n<p><strong>This article is published as part of the Foundry Expert Contributor Network.<br \/><\/strong><a href=\"https:\/\/www.csoonline.com\/expert-contributor-network\/\"><strong>Want to join?<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that never execute. DAST shrugs because the route to the vulnerable function is blocked. SCA floods the zone with CVEs that never touch a hot path. MAST scolds my mobile app for secrets I retired last quarter. These tools are still essential, yet they now form a baseline rather than&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15460\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15460","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15460"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15460\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}