A-005 - Application Security
Purpose
Ensure that applications and exposed services are designed, configured and maintained in a way that reduces the risk of compromise, data exposure or misuse.
Asset Type
- Business Capability
Description
- Covers the security of web applications, APIs and service-level logic within the Scheol environment
- Includes authentication mechanisms, input handling, configuration security and exposure management
At the current stage:
- applications are deployed with basic hardening measures
- no formal secure development lifecycle is in place
- protection against common web vulnerabilities is limited
- no dedicated Web Application Firewall (WAF) is deployed
Security posture varies depending on the application and hosting context.
Criticality
- High
Application compromise can lead to:
- unauthorized data access
- remote code execution
- lateral movement into the infrastructure
Sensitivity
- Sensitive
Applications may process:
- user data
- business-related data (e.g. ERP)
- authentication and session information
Exposure Level
- Exposed
Applications hosted in Heaven are publicly accessible over HTTP/HTTPS. They represent a primary entry point into the environment.
Trust Zone
-
Hybrid
-
Heaven → exposed applications (primary attack surface)
-
Hell → internal services and future application components
Dependencies
- Infrastructure Hosting (runtime environment)
- Network Security & Segmentation (exposure control)
- Identity & Access Management (authentication mechanisms)
- Reverse proxy layer (traffic routing)
- Database systems (data storage)
Relationships
- Monitoring & Detection (application logs and events)
- Administrative Access (application management)
- Backup & Recovery (application data protection)
- Documentation & Governance (security posture and traceability)
Security Position (Architecture Context)
- Primary external attack surface
- Entry point for most realistic threat scenarios
Key roles:
- processes external inputs
- exposes services to untrusted environments
- interacts with sensitive data and backend systems
Current structural weaknesses:
- absence of WAF or application-layer filtering
- limited protection against common web vulnerabilities (e.g. injection, XSS)
- lack of standardized hardening across applications
- co-location of services increasing blast radius in case of compromise
Existing Protective Measures
- basic application configuration hardening
- restricted administrative access
- use of HTTPS via reverse proxy
- separation of user and administrative accounts where applicable
Limitations:
- no centralized application security controls
- no systematic vulnerability management process
- no automated security testing (SAST/DAST)
- no application-layer monitoring or alerting
Owner / Responsibility
- Security Role (Sec)
Notes
Application Security is a key exposure point in the Scheol Security Lab, especially for services hosted in Heaven.
Current implementation is functional but limited, reflecting an early-stage security posture.
Planned improvements include:
- introduction of a Web Application Firewall (WAF)
- better isolation between applications and services
- improved configuration hardening standards
- integration of application-level logging and monitoring
- progressive introduction of secure development and deployment practices
This asset is central to reducing external attack surface and improving overall resilience.