{"id":1987,"date":"2022-02-22T14:58:34","date_gmt":"2022-02-22T14:58:34","guid":{"rendered":"https:\/\/www.pcidssguide.com\/?p=1987"},"modified":"2023-10-09T19:14:36","modified_gmt":"2023-10-09T19:14:36","slug":"what-is-runtime-application-self-protection-rasp","status":"publish","type":"post","link":"https:\/\/pcidssguide.com\/what-is-runtime-application-self-protection-rasp\/","title":{"rendered":"What is Runtime Application Self Protection (RASP)"},"content":{"rendered":"\n\n\n\n\n

An increasing number of organizations are using DevOps to improve enterprise applications’ development, deployment, and maintenance. DevOps is a positive step, but it can introduce security risks.<\/p>\n\n\n\n

The new approach, called DevSecOps, helps identify and mitigate these issues early in the development lifecycle by incorporating security into the DevOps process. However, several impediments remain between the security and development teams.<\/p>\n\n\n\n

See Also: Cloud Application Security Guide with Best Practices<\/a><\/strong><\/p>\n\n\n\n

Because of the competitive nature of software development, organizations require lightning-fast delivery speeds to remain competitive. Fast delivery times can cause DevOps and SecOps teams to split up. Some developers are solely concerned with application development and do not consider security one of their primary responsibilities.<\/p>\n\n\n\n

It mostly leaves the SecOps teams to scan for vulnerabilities in the production environment later. But it is everyone’s responsibility to shift the mindset to security to move security to the forefront of the building process.<\/p>\n\n\n\n

One way to protect applications from attacks is to protect themselves by detecting and blocking attacks in real-time. Real-time blocking is precisely what technology called Runtime Application Self-Protection (RASP) does.<\/p>\n\n\n\n

See Also: Cloud Security Checklist<\/a><\/strong><\/p>\n\n\n\n

Runtime implementation self-protection (RASP) is a relatively new approach. However, it can help close the gap, providing runtime-level protection, peace of mind, and information to developers about vulnerable lines of code.<\/p>\n\n\n\n

This article provides an overview of Runtime Application Self-Protection (RASP) and what it is all about.<\/p>\n\n\n\n

What is Runtime Application Self-Protection (RASP)?<\/strong><\/h2>\n\n\n\n

Runtime Application Self-Protection (RASP) is a technology that runs on a server and kicks in when an application is running. RASP is designed to detect attacks against an application in real-time.<\/p>\n\n\n\n

Once an application is running, RASP can protect it from malicious input or behavior by analyzing the application’s behavior and the context of that behavior. By using the application to monitor its behavior constantly, attacks can be instantly identified and mitigated without human intervention.<\/p>\n\n\n\n

Runtime Application Self-Protection (RASP) incorporates security into a running application wherever it resides on a server. It intercepts all calls from the application to a system, ensuring they are secure and verifying data requests directly within the application.<\/p>\n\n\n\n

Both web and non-web applications can be protected by RASP. Because the detection and protection features of RASP run on the server where the application is running, the technology does not affect the application’s design.<\/p>\n\n\n\n

How Runtime Application Self-Protection (RASP) Works<\/strong><\/h2>\n\n\n\n

When a security event occurs in an application, RASP takes control of the application and fixes the problem. RASP will only generate an alarm that something is wrong in diagnostic mode. In protection mode, it will attempt to resolve the issue. For example, it can prevent the execution of instructions to the database, which looks like a SQL injection attack.<\/p>\n\n\n\n

Other actions that RASP can take include ending a user’s session, stopping the execution of an application, or alerting the user or security personnel.<\/p>\n\n\n\n

Software developers can access RASP technology through function calls in an application’s source code or take a completed application and put RASP in a wrapper that enables the application to be secured with the push of a button.<\/p>\n\n\n\n

See Also: Best Practices for Cloud Security<\/a><\/strong><\/p>\n\n\n\n

The first approach is more accurate because developers can specify which parts of the application they want to protect, such as logins, database queries, and administrative functions.<\/p>\n\n\n\n

Whatever method is used with RASP, the result is like equipping a web application firewall with the application’s runtime context. This close connection to the application means that RASP can be more fine-tuned to the application’s security needs.<\/p>\n\n\n\n

The primary capabilities of Runtime Application Self-Protection (RASP) are:<\/p>\n\n\n\n