Source Code Review - v12.2
Source Code Review - v12.2
Service Scope
Trustwave’s SpiderLabs Application Source Code review combines Static Analysis Security Testing (SAST)
techniques with manual review and testing techniques of the target application, providing a deliverable with both
tactical and strategic recommendations to improve the security posture of such target application. These
recommendations are both actionable and advisory in nature and are presented to the customer.
The process involves methodical and expert driven testing of the target application to determine if the application
is vulnerable to application layer security risks. This level of testing validates the application layer security controls
and the security effectiveness of software development and deployment standards by determining how resilient
the web application is to determined attackers.
During the Trustwave Application Source Code Review, SpiderLabs manually inspect relevant application source
code to:
Below is a non-exhaustive list of the typical areas of focus for an application source code review that can be
tailored upon request in conjunction with Client:
Deliverables
The deliverable is the Application Source Code Review report, which documents the application’s existing security
posture, identifies specific weaknesses and vulnerabilities, allowing development teams to correct application
defects that otherwise weaken the robustness of the application from a security perspective.
Documentation Review
Trustwave conducts a detailed review of the existing documentation for each application listed in this proposal,
including design documents, concept of operations, and source code listings. On an as-needed basis, Trustwave
requests clarification on components of the site, functionality, program flow, and design issues.
The following table lists some of the different vulnerability classes Trustwave covers during an Application Source
Code Review. This list is not intended to be exhaustive and the actual review performed depends on the specifics
of the application being assessed. Some of the vulnerabilities may not be possible in some types of languages or
frameworks (e.g., managed memory environments) but Trustwave is experienced in providing security services
for any architecture. In all projects, Trustwave customizes the test plan to fit the technology used by the
application.
The review team documents any potential security flaws. As and when questions arise regarding the operation or
functionality of the code, Trustwave compiles questions and periodically contacts the development team to
resolve any outstanding enquiries.
Deliverables
Following the conclusion of the engagement, findings are made available. The deliverables are both strategic and
tactical in nature, presented in a format that is highly accessible to both management and operational staff. Each
finding has an associated risk score, as well as containing detailed technical information pertaining to the nature
of the finding. Each finding is also presented with clear guidance on how to remediate the issue.