Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Reducing risk and driving innovation with Microsoft Application Inspector

Tips for effectively managing a software portfolio

Share

Software behavior – an overlooked risk

Leaders invest in software development to achieve business goals faster. With constant pressure around pushing new features and speed to market, it is difficult for IT organizations to keep tabs on the capabilities and behaviors of the portfolio of software they build. While typical application security testing like static application security testing (SAST) and software composition analysis (SCA) are used to help spot known vulnerabilities and anti-patterns, a necessary part of reducing risk for a business requires a solid knowledge of your applications’ features and capabilities.

Targeting the things that matter

The goal of application security teams is to protect the business from relevant threats so developers’ primary focus can remain on new features that deliver innovation and growth. For any given organization those threats may look and feel a bit different.

For example, some companies’ software portfolios may rely heavily on sending and receiving data from external sites, where pre-built patterns around secure input and output handling would increase developer efficiency. Others may have a large prevalence of source code and third-party dependencies related to cryptography, where evangelizing the right hashing algorithms and encryption protocols used across the portfolio reduces significant risk.

But without knowing what’s happening in an application’s code base, reducing risk and optimizing one’s portfolio for the right business outcomes becomes harder because threat prevention, developer education efforts such as security champions programs, and software portfolio strategy become a guessing game.

Reducing business risk with Application Inspector

Microsoft’s Application Inspector is an open-source tool that identifies a long list of “interesting” features in source code, such as...

  1. What types of interactions the software has with the underlying operating system
  2. Whether the application has any integration with popular social media sites
  3. Whether the application may collect personal user data, triggering the need for privacy controls

Such information can be used to understand which risks pose the greatest threat to the software your organization develops.

KPMG has identified a few moments where Application Inspector can help answer difficult questions:

NumberMomentApplication Inspector can answer questions like...Useful for...
1When you need to understand a single applicationWhat are the main things this application does?Knowing what controls I may need around my application (goes well with an SBOM)
2When you need to understand a portfolio of applicationsWhat is it that my portfolio of applications does, and how is that changing over time?Planning technology investments and security pattern creation
3When there has been a cyber security breachHas something changed in the functionality of a particular application since the attacker had access to my source code repositories?Protecting users from a malicious actor as part of incident response
4When you need to understand what capabilities malware has and you have the source codeWhat does this malware do?Knowing what remediation is needed or preventative controls I may need in the future


Application Inspector is free to use, can be automated in build pipelines for DevSecOps teams, and updated regularly with new features. Adding Application Inspector to a software management toolset, in combination with traditional application security capabilities like SAST and SCA, may help to more quickly and accurately protect the organization from relevant threats, identify opportunities for feature rationalization across the portfolio, and devote more time to the frequent production of high-quality software.

Microsoft and KPMG are alliance partners and frequently work together to solve the hardest business problems facing large organizations.

This blog article is not intended to address or provide advice concerning the specific circumstances of any particular individual or entity and does not constitute an endorsement of any entity or its products or services.

The KPMG name and logo are trademarks used under license by the independent member firms of the KPMG global organization.

Meet the team

Image of Charles A. Jacco
Charles A. Jacco
Principal, Cyber Security, KPMG US
Image of Caleb Queern
Caleb Queern
Managing Director, Cyber Security, KPMG US

Explore related insights

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline