Is SQL Injection a Terminable Offense?
I recently read an editorial on SQL Server Central by Steve Jones titled “Review Your Code” in which he asserts: “if you write code after today that’s susceptible to SQL Injection, you ought to be fired”.
I am certainly not going to disagree. However, I don’t believe we should narrow the scope of the witch hunt to just the “coders”. If you want to go on a termination rampage after a breach, you should probably look beyond just the code monkeys.
What about anyone who calls themselves an “architect”. If you design a Swiss cheese system to begin with, what do you expect from the engineers?
What about the DBAs? Why aren’t they standing up and demanding the use of parameterized queries to interact with their databases? Or better yet, demand applications interact with the database using only stored procedures so that the application user(s) only need(s) CONNECT and EXECUTE permissions?
What about QA? How does an application get deployed these days without at least some cursory security testing?
If the application is business critical, what about the decision makers? Are they willing to write the checks to perform a REAL penetration test on the application? (Not just a scan)
This list is by no means exhaustive. Depending upon your organization, there are probably plenty of other roles on the development team that should be security conscious too. So when it comes time to hand out punishment after a breach, just firing the code monkey will probably not fix your problem.
Explore More Blog Posts
Pentesting for Third-Party Risk Management: What CISOs Should Demand from Vendors
Learn why traditional third-party risk management fails and what CISOs must demand from vendors, including continuous pentesting, to manage third-party risk effectively.
Public Report: Android Quick Share Application Penetration Test
NetSPI's penetration test of Protocol X in Google Pixel 10 Pro's Quick Share Extension found one low-severity issue, now resolved. Read the full report.
Navigating the PTaaS Market with the GigaOm Radar Report
Explore the GigaOm Radar for Penetration Testing as a Service (PTaaS) to see why NetSPI was named a Leader and Outperformer.