The Applications Handbook.pdf - Nexus Technologies Inc.
The Applications Handbook.pdf - Nexus Technologies Inc.
The Applications Handbook.pdf - Nexus Technologies Inc.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
RUN: Maintaining the Responsive Live Application ■ 73<br />
effectively repairs performance problems. Using a shared set of<br />
diagnostic and monitoring tools, your team spends less time<br />
deciding which tools to use, and more time resolving the performance<br />
problems at hand.<br />
<strong>The</strong> Best Defense Is a Good Offense:<br />
Attacking Security Risk<br />
It doesn’t matter how strong your locks are if expected visitors<br />
do the unexpected. IT has spent untold resources strengthening<br />
networks, firewalls, and operating systems only to metaphorically<br />
leave the door wide open for hackers to attack at the<br />
application layer.<br />
<strong>Applications</strong> must traverse infrastructure and organizational<br />
boundaries to do what they need to do, so they should be subject<br />
to security analysis before they go live.<br />
However, the security challenge doesn’t stop there. Because<br />
threats evolve and as malicious hackers learn new tricks, an<br />
application that was secure yesterday may be vulnerable today.<br />
Not only is it necessary to scan production systems, you must<br />
update the scanning technology to address the latest threats.<br />
A regular audit and remediation of production security issues<br />
leads to a consistent understanding of how applications should<br />
behave and how they actually do behave in production. <strong>The</strong>se<br />
efforts to secure applications in production also reap continual<br />
improvement benefits as resulting actions are again fed<br />
directly back into the development and testing processes.<br />
Application Change Management<br />
<strong>The</strong> only constant in modern applications is change.