Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Top 10 Low-Code/No-Code Risks and How To Secure Rapid Development
Cybersecurity as a Business Enabler

Top 10 Low-Code/No-Code Risks and How To Secure Rapid Development

Bill DoerrfeldBy Bill DoerrfeldAugust 22, 2023Updated:August 22, 20235 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The Open Web Application Security Project (OWASP) maintains OWASP Low-Code/No-Code Top 10, a list of the most common vulnerabilities associated with low-code/no-code. A team of security researchers has vetted this project, and it stands as a comprehensive checklist of potential concerns. Below, we’ll briefly highlight each vulnerability and present methods to secure low-code environments.

Vulnerability #1: Account Impersonation

This risk stems from an attacker impersonating the application owner’s identity. For example, suppose a developer creates an application and connects to a database using their admin user login. Now, end users use the same identity whenever they access the data. This vulnerability can lead to unauthorized data access and privilege escalation. It also makes it impossible to distinguish between legitimate and malicious usage.

#2: Authorization Misuse

This is a broad risk for low-code/no-code applications; it involves the developer assigning incorrect permissions to end users. For instance, this could be multiple application programming interface (API) connections left “on” through short-lived OAuth tokens. Authorization gaps can mean that users have privileges to access data or functionality that they are not supposed to access.

#3: Data Leakage and Unexpected Consequences

Depending upon the application design, unintended data leakages might occur. This could happen when sharing access to corporate databases with other users or when automated triggers pass data from one application to another. A low-code architecture could easily leak sensitive information if developers are unaware that data replicates in less secure connected environments.

#4: Authentication and Secure Communication Failures

Much can go wrong when setting up connections to data in a low-code context. If best practices, such as encryption, strong authentication, and secure configurations, aren’t applied, the application could be prone to leaking data in transit. Therefore, it’s recommended to have security personnel set up connections or at least review them regularly for security considerations.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

#5: Security Misconfiguration

There are numerous ways in which low-code applications might be misconfigured or using default conditions, causing potential security problems. Issues such as oversharing, unprotected endpoints, and exposing secrets to anonymous parties all fall into this risk category. To limit the potential for stealing or manipulating data, it’s recommended to review platform guidelines for configuration best practices and apply careful change management.

#6: Injection Handling Failures

Since many low-code/no-code platforms accept direct user input, they are often prone to injection-style attacks. which involve an attacker inserting malicious code to disrupt the activity of an application or trigger nefarious actions to occur. For example, a system might interpret an injection as code to run and end up deleting database records.

#7: Vulnerable and Untrusted Components

Low-code applications are just as susceptible to supply chain risks as other development styles since they rely on various underlying components and third-party connections. These components may not be fully secured or visible and thus can’t be 100% trusted. In a low-code context, these components could be pre-made widgets in some sort of marketplace.

#8: Data and Secret Handling Failures

Low-code applications sometimes store secrets, such as username and password pairs, API keys to access external systems, or personally identifiable information (PII). Often, this sensitive data ends up sitting unencrypted or is hard-coded into applications or moved around against geographic restrictions. Insecure secrets management could cause secrets to be intercepted by bad actors or cause a company to run afoul of compliance requirements.

#9: Asset Management Failures

Business users can quickly generate low-code/no-code applications. While this advances software democratization, it also means that countless applications could instantly be created without forethought around business continuity or asset management. Without adequate inventory management and maintenance practices, many applications could be left unmaintained and forgotten.

#10: Security Logging and Monitoring Failures

Low-code/no-code applications are inherently usable, yet they often lack visibility into backend logs. Insufficient logging can hinder application owners when trying to track user behaviors or diagnose failures. Conversely, applications might overshare these logs, producing a different kind of risk in terms of oversharing application logic to unauthorized parties.

Ways to Mitigate Low-code/No-code Security Risks

Now that we’re aware of top risks associated with low-code/no-code usage, what are some methods to secure these environments? Here are nine specific ways to mitigate the above risks, according to OWASP:

  • Use dedicated application or service accounts rather than user accounts.
  • Don’t abuse authorization flows by storing and using short-lived refresh tokens.
  • Limit the number of external connectors to sensitive data.
  • Only assign connections to users and applications that require them.
  • Follow security best practices as prescribed by low-code platform vendors.
  • Sanitize the input users enter into the application.
  • Be careful connecting third-party components and limit use to trusted dependencies.
  • Take inventory of applications and turn off any that are unused.
  • Enable application logging and monitoring when possible.

In addition to the above considerations, enterprises might find themselves using multiple low-code/no-code platforms, which will likely require incorporating more governance to centralize policies. In general, many of these cybersecurity practices hinge on following the principle of least privilege. If a zero-trust mindset is adopted, you can narrow the scope and limit the potential attack surface.

Hardening Low-Code/No-Code Strategies

Low-code/no-code usage appears to be increasing, lately accelerated through the use of next-generation AI-like large language models (LLMs). Gartner estimates that by 2025, 70% of applications will be developed using low-code/no-code technologies. With these growth projections, low-code/no-code security must remain a continuous priority.

The OWASP Low-Code/No-Code Top 10 does a good job of outlining the most frequent attack vectors to consider. By following the recommendations above, organizations can harden their citizen development strategy. On the other hand, applying some of these mitigations, such as removing broad authorization scopes, can reduce accessibility and easy access to features. Thus, IT leaders should consider reviewing each threat type in deeper detail to see how their organization can effectively balance security with usability.


for more cybersecurity insights, visit the cybersecurity channel

authentication data featured low-code/no-code vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

How Copilots from Microsoft and ServiceNow Impact Your Business, Tech Competitors

August 30, 2023

Couchbase Speeds Development of Cloud Database Apps With Generative AI

August 30, 2023

Why Generative AI Startups Flock to Google Cloud

August 30, 2023

AI Index: Dell Drives Generative AI; Thomson Reuters Acquires Casetext; Lookout’s Cybersecurity Assistant

August 30, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How Copilots from Microsoft and ServiceNow Impact Your Business, Tech Competitors
  • Couchbase Speeds Development of Cloud Database Apps With Generative AI
  • Road to Oracle CloudWorld: Taco Bell’s Lesson for B2B and CX With Rob Tarkoff
  • Why Generative AI Startups Flock to Google Cloud
  • AI Index: Dell Drives Generative AI; Thomson Reuters Acquires Casetext; Lookout’s Cybersecurity Assistant

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.