How to Use This Cybersecurity Resource
The Application Security Authority directory is structured to serve security professionals, software engineers, compliance officers, and researchers navigating the application security service sector. This page describes how content is organized, how specific topics are located, how accuracy is maintained, and how this reference interacts with other authoritative sources. The scope spans over 60 topic areas covering tools, standards, frameworks, vulnerability classes, and practitioner roles across the application security discipline.
How to find specific topics
Content on this site is organized into discrete topic areas, each scoped to a specific domain within application security. The taxonomy follows functional groupings used by standards bodies including NIST and the Open Web Application Security Project (OWASP), ensuring alignment with terminology professionals already use in practice.
To locate relevant content, start with the broadest applicable category:
- Foundational concepts — Pages covering application security fundamentals and the secure software development lifecycle establish the baseline framework. These are the appropriate entry points for professionals assessing program maturity or onboarding into an AppSec role.
- Testing methodologies — Distinct pages cover static application security testing, dynamic application security testing, and interactive application security testing. Each page addresses a specific testing phase with different tooling profiles and integration points.
- Vulnerability classes — Individual vulnerability topics such as cross-site scripting (XSS), injection attack prevention, and broken access control risks map directly to the OWASP Top 10 taxonomy and CWE classifications maintained by MITRE.
- Compliance and standards — Pages on PCI DSS application security requirements and HIPAA application security compliance are scoped to regulatory obligations, not general best practices. These are distinct from framework pages such as the NIST Secure Software Development Framework.
- Tools and vendors — The application security tools comparison and AppSec vendor directory pages serve procurement and evaluation workflows.
- Career and program development — Pages on AppSec careers and roles, AppSec metrics and KPIs, and AppSec program building address organizational and workforce dimensions.
When a topic falls across multiple categories — for example, supply chain security for software intersects with vendor risk, SBOM requirements under Executive Order 14028, and software composition analysis tooling — the relevant pages cross-reference each other through inline links.
How content is verified
Each page cites named public sources: regulatory agencies, standards bodies, and published frameworks. Primary references include NIST Special Publications (particularly SP 800-218, the Secure Software Development Framework), OWASP project documentation, the CWE/CVE databases maintained by MITRE, and regulatory guidance from the FTC, HHS Office for Civil Rights, and the PCI Security Standards Council.
Content is classified into two verifiability tiers:
- Tier A — Regulatory and standards-backed claims: Statements that can be traced to a named statute, regulatory notice, or published standard (e.g., OWASP Top 10, NIST SP 800-53, PCI DSS v4.0). These include specific penalty thresholds, defined control requirements, and enumerated vulnerability categories. All such claims carry inline attribution.
- Tier B — Industry-consensus structural claims: Statements describing common professional practice, tooling categories, or role definitions that are widely documented across practitioner sources (SANS Institute, ISC2, ISACA) but not codified in a single authoritative document. These are framed as structural descriptions, not as regulatory requirements.
Statistics and quantified figures (breach cost averages, vulnerability frequency rates, certification examination pass rates) are cited at point of use with a named source and year. Figures that cannot be traced to a named public document are either omitted or reframed as structural observations.
How to use alongside other sources
This reference describes the application security service sector — it does not replace the primary sources it cites. The application security standards and frameworks page maps the relationship between frameworks such as NIST SSDF, OWASP SAMM, and ISO/IEC 27034, but practitioners implementing any of these frameworks should consult the original published documents directly.
Regulatory compliance pages (HIPAA, PCI DSS) describe the application security requirements embedded in those frameworks. They do not constitute legal or compliance advice. The authoritative texts are the HHS Security Rule (45 CFR Part 164) and the PCI DSS standard published by the PCI Security Standards Council, respectively.
For vulnerability-specific research, MITRE's CVE database and the NVD (National Vulnerability Database) maintained by NIST at nvd.nist.gov are the primary sources for specific CVE identifiers, CVSS scores, and affected software versions. Pages on this site covering vulnerability classes such as deserialization vulnerabilities or XML security vulnerabilities provide structural context and classification; they do not replicate or substitute for the NVD's per-CVE records.
Professionals requiring jurisdiction-specific legal interpretation, licensing guidance, or formal compliance assessments should engage qualified legal counsel or a certified information security professional (CISSP, CISA, or equivalent credential recognized by ISC2 or ISACA).
Feedback and updates
The application security discipline evolves continuously. OWASP releases updated Top 10 lists on an irregular cycle (the 2021 edition introduced 3 new categories compared to the 2017 edition). NIST updates its Special Publications through a public comment process documented at csrc.nist.gov. PCI DSS moved from version 3.2.1 to version 4.0 in March 2022, with a 2-year transition window ending in March 2024 (PCI Security Standards Council).
When standards bodies publish substantive revisions, pages referencing those standards are updated to reflect the current published version. Version dates and source citations on individual pages indicate the edition of a standard being described.
Errors, outdated information, or missing topics can be reported through the contact page. Submissions identifying specific factual discrepancies — with a named correcting source — are prioritized over general feedback. The directory scope and coverage rationale are described separately on the cybersecurity directory purpose and scope page.