Application Security Providers
The Application Security Authority provider network indexes service providers, practitioners, tools, and organizations operating within the application security sector across the United States. This page describes the structural organization of those providers, the verification standards applied before publication, where gaps remain in current coverage, and the mechanisms used to keep indexed information accurate over time. Readers navigating the will find the classification logic here aligned with the broader provider network framework.
Verification status
Providers published in this network are evaluated against a defined set of qualification signals before inclusion. Verification does not constitute endorsement; it establishes that a verified entity meets minimum documentary thresholds for inclusion in a reference-grade index.
Verification tiers applied across providers:
- Confirmed active — Organization or practitioner has a verifiable public presence, active service offering, and at least one named credential, published audit, or regulatory authorization traceable to a named body (such as a FedRAMP authorization, PCI DSS Qualified Security Assessor status under the PCI Security Standards Council, or CREST accreditation).
- Pending review — Entity has submitted information or been identified through secondary sources but has not completed documentary confirmation. Providers at this tier are labeled accordingly and excluded from ranked or featured positions.
- Unverified/legacy — Entries carried forward from earlier index states where original sourcing is incomplete. These remain visible for research continuity but are flagged for reinvestigation on a rolling basis.
Practitioner-level providers are cross-referenced against publicly verifiable credentials. The GIAC Security Expert (GSE), Offensive Security Certified Expert (OSCE3), and Certified Application Security Engineer (CASE) designations from EC-Council are examples of credentials that appear in provider profiles when publicly documented by the issuing body. Providers referencing NIST SP 800-53 Control SA-11 compliance applicability are noted as such when the provider serves federal or FedRAMP-scoped clients (NIST SP 800-53 Rev. 5).
Coverage gaps
No provider network covering a sector as fragmented as application security achieves complete coverage at launch or at any static point in time. Documented gaps in the current index include:
- Regional penetration testing boutiques — Firms with fewer than 10 employees operating at the state or metropolitan level are underrepresented. Identification relies on public registration data, conference speaker records, and CVE acknowledgment appearances, all of which have uneven density across geographies.
- Open-source tool maintainers — Maintainers of significant open-source application security tooling (SAST engines, fuzzing frameworks, dependency scanners) are indexed only where the maintainer operates a commercial service or has a publicly verified organizational affiliation. Pure open-source contributors without a commercial presence fall outside the provider network's service-provider scope.
- Managed application security service providers (MSSPs) with limited public disclosure — MSSPs operating under non-disclosure frameworks for government clients frequently omit service detail from public-facing materials, making classification and verification against named standards difficult.
- Academic and research entities — University research groups conducting application security research (vulnerability disclosure, protocol analysis, fuzzing studies) are outside the primary provider scope, which is oriented toward the commercial and professional services market.
Gaps are documented rather than concealed. Researchers requiring broader coverage of the academic or open-source sectors should supplement provider network use with direct queries to the OWASP Foundation project registry and the NIST National Vulnerability Database contributor records.
Provider categories
Providers are organized into 6 primary categories, each with defined classification boundaries:
-
Application security assessment firms — Organizations delivering penetration testing, code review, and threat modeling as client-facing professional services. Subcategories distinguish web application specialists, mobile application specialists, and API security specialists. A firm is not cross-verified in multiple subcategories unless its public service documentation explicitly covers each domain.
-
Application security tooling vendors — Commercial vendors of SAST, DAST, IAST, SCA (software composition analysis), and RASP (runtime application self-protection) products. Tool category assignments follow the OWASP Application Security Verification Standard (ASVS) control domain taxonomy rather than vendor-supplied marketing categories.
-
Training and certification providers — Organizations delivering credentialed application security training. Inclusion requires that the certification or curriculum be publicly documented and that the issuing body maintain a verifiable credential registry. The How to Use This Application Security Resource page describes how to filter providers by credential type.
-
Managed AppSec service providers — Firms offering continuous application security monitoring, vulnerability management programs, or bug bounty program management as ongoing retainer or subscription services, distinct from project-based assessment engagements.
-
Compliance and regulatory advisory firms — Providers whose primary application security service is compliance mapping — PCI DSS Requirement 6 assessments, HIPAA §164.312 technical safeguard reviews, or FedRAMP boundary analysis — rather than offensive security or tooling.
-
Independent practitioners — Credentialed individual consultants operating outside a firm structure. Providers in this category require at least 1 publicly verifiable credential from a recognized body and evidence of active professional activity within the prior 24-month window.
How currency is maintained
Provider Network currency depends on structured review cycles rather than passive accumulation. The following mechanisms govern how providers are updated, flagged, or removed:
- Scheduled reinvestigation — All confirmed-active providers are reinvestigated on an 18-month cycle. Reinvestigation checks for organizational continuity, credential status, and any material change in service scope.
- Regulatory trigger updates — When a named regulatory body (PCI Security Standards Council, NIST, CISA) publishes a standard revision or a new authorization list, providers referencing that standard are prioritized for review in the subsequent update cycle.
- Public record monitoring — Enforcement actions, license revocations, or formal delistings from accreditation bodies (such as CREST or the PCI SSC's QSA company list) trigger immediate review of affected providers.
- Submission-based corrections — Factual corrections to existing providers submitted through the contact pathway are reviewed against documentary evidence before any change is published. Submissions without supporting documentation are logged but do not trigger immediate changes.
Providers that cannot be reverified within 24 months of their last confirmed-active status are reclassified to the unverified/legacy tier and annotated with the date of last verified contact. They are not removed by default, as archived entries retain reference value for historical research into the application security providers landscape over time.
References
- Software Engineering Institute at Carnegie Mellon
- NIST SP 800-53 Rev. 5
- 17 CFR §229.106
- Computer Fraud and Abuse Act — 18 U.S.C. § 1030
- NIST SP 800-53 — Security and Privacy Controls
- Cybersecurity and Infrastructure Security Agency
- CIS Critical Security Controls
- ISO/IEC 27001 — Information Security Management
References
- Software Engineering Institute at Carnegie Mellon
- 17 CFR §229.106
- 18 U.S.C. § 1030
- 21st Century Cures Act (Public Law 114-255)
- 42 U.S.C. § 17931
- 44 U.S.C. § 3551
- 44 U.S.C. § 3551 et seq.
- 45 CFR Part 164
- NIST SP 800-53 Rev. 5