paint-brush
How to Make Application Security Easy to Adopt, Run and Maintain  by@imnf
383 reads
383 reads

How to Make Application Security Easy to Adopt, Run and Maintain

by Imran AzizJuly 25th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Security must be easy to adopt, run, maintain, maintain and easy to implement. The network as we know it is no longer sufficient and we need to reinvent it. The purpose of a network is transmitting, exchanging or sharing data and resources – not security. The best way to protect our applications is to make security so easy and free that it becomes a standard that everyone can implement. We need to use first principles thinking to dig deeper until we are left with only the ‘foundational truths of a situation’

Company Mentioned

Mention Thumbnail
featured image - How to Make Application Security Easy to Adopt, Run and Maintain
Imran Aziz HackerNoon profile picture



Protecting applications is getting more complicated and complex. Applications must attach to networks exposing them to all the insecurities that come with it. What if we could stop all attacks. Threats could exist on the network and not attack our applications. What if it was easy, free and open source?

Security must be easy to adopt, run, and maintain.

Before we answer the question of making traditional network security irrelevant as a standard, let’s position the problem:
  • We all care about security – but man, it’s hard. It’s so hard that we don’t have the time to spend on it. We end up focusing our time on implementing features – NOT security.

  • All networks are insecure. Period. The purpose of a network is transmitting, exchanging or sharing data and resources – not security.

  • Insecure networks have us being crushed in the cybersecurity war. It‘s too cheap and easy for malicious actors to launch attacks, laterally move and exploit. We implement elaborate, time-consuming and costly controls and infrastructure to protect our applications, and still, malicious actors make massive revenue causing enormous costs for society.
  • System operators must be ever vigilant to stop vulnerabilities being exploited by malicious actors across the network – watching email lists, scanning for updates, coordinating change windows and downtime, implementing patches.

  • The zero trust security model was created to reduce network risks by leveraging strong identities and the idea of “never trust, always verify” but it is historically hard to implement and put the onus on the application consumers, not application creators.


Security is hard. But it is mandatory. Security must be easy to adopt, run, maintain. When it is, it becomes standard to the benefit of everyone.


Let’s demonstrate this using a case study. A little over ten years ago, when using a browser to access websites, all data was transferred using the unencrypted HTTP. Then (free and open source) technologies like  and  came along. HTTPS was a great idea and became so easily accessible and vastly available that ALL major browsers implemented it, leading to the retirement of HTTPS Everywhere.

We need to go through the same process to secure our applications. Securing the network, which is impossible, must become a thing of the past, just like HTTPS Everywhere.

Foundational truths about networks

The best way to protect our applications is to make security so easy and free that it becomes a standard that everyone can implement. The network as we know it is no longer sufficient. We need to reinvent it.


Luckily, we have the core technology concepts to deliver this. We need to use first principles thinking to dig deeper until we are left with only the foundational truths of a situation.


  • Zero trust security model: This provides principles including strong identity, authentication and authorization, account-based access control policies, etc.

  • Network virtualization: This allows us to create overlays virtual networks independent of the underlying transport networks.


The foundational truth is that networks are built to transmit, exchange, and share data. While zero trust and virtualization can be applied to networks, we are bolting on solutions that do not fully solve the problem. We need easy and secure, not complex and bolted on. It is only by recognizing that just because “we’ve always done it this way” does not mean we always have to; we can reinvent the network.

Reinvent the network by eliminating the network

The only way to square the circle is to embed zero trust, programmable networking into our applications based on open source technologies that are easy and free. This reinvents the network by putting it inside the application. . Put zero trust networking inside the app and it becomes the app, run your application on the internet and it becomes the internet. Application connectivity is secure by default while isolating apps from the internet, local, and host OS networks.

App communication cannot occur until explicitly authenticated and authorized based on a strong embedded identity. This isolation from the underlay, including no exposed/listening ports, stops malicious external actors from exploiting the network. These attacks include zero-day/CVE exploit, DDoS, port scanning, credential/password stuffing, phishing, etc. We have made traditional network security irrelevant.

Free and open source application embedded networking does not just have profound security advantages and the ability for us to focus on value-added services and features instead of hard security; it also helps us to reduce business costs and vendor lock-in. These applications only require commodity outbound internet and eliminate the need for public DNS, VPNs, bastions, complex firewall rules, inbound ports, or other proprietary tools and infrastructure. We can programmatically manage the overlay and policies using DevOps tools and methodology without requiring networking engineering skills.


is an open source, free and easy way for the world to embed zero trust, programmable networking into anything and everything. Embedding every application in the world with zero trust will take time – just like securing browsers took time and VPNs were in the past! Use these local programs to protect your existing applications and infrastructure and allow your brownfield solutions to participate in the new, identity-driven zero trust overlay network.

Existing applications implement zero trust of the local and internet networks providing an immediate and huge reduction in attack surface. Accessing your apps exclusively over the zero trust overlay network raises the bar on attackers by orders of magnitude. Bad actors can no longer attack targets from afar. They need to be local to the machine to launch an attack reducing the return on investment for malicious actors such as ransomware operators.

The network is dead, long live the application network.


[1] We refer to traditional network security as things such as public DNS, VPNs, MPLS, bastions, APNs, proxies, complex firewall rules, inbound ports, or other proprietary tools and infrastructure.


Also Published


바카라사이트 바카라사이트 온라인바카라