<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[AppSec Adventure]]></title><description><![CDATA[AppSec Adventure aims to provide you useful tools and insights to build your own Application Security program that works in the real world, not just on paper.]]></description><link>https://blog.appsec-adventure.com</link><image><url>https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png</url><title>AppSec Adventure</title><link>https://blog.appsec-adventure.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 23:39:53 GMT</lastBuildDate><atom:link href="https://blog.appsec-adventure.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[AppSec Adventure LLC]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[appsecadventure@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[appsecadventure@substack.com]]></itunes:email><itunes:name><![CDATA[Anne Bendix]]></itunes:name></itunes:owner><itunes:author><![CDATA[Anne Bendix]]></itunes:author><googleplay:owner><![CDATA[appsecadventure@substack.com]]></googleplay:owner><googleplay:email><![CDATA[appsecadventure@substack.com]]></googleplay:email><googleplay:author><![CDATA[Anne Bendix]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Role: The Catalyst]]></title><description><![CDATA[For consultants &#8212; and those who might hire them: here's how to leverage external expertise without long-term dependency.]]></description><link>https://blog.appsec-adventure.com/p/role-the-catalyst</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-catalyst</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 13:25:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hiring a security consultant can speed up the development of your internal AppSec capacity or hold it back. It depends heavily on clear boundaries, expectations, and accountability. This deep dive on the <em><strong>Catalyst</strong></em> role provides a blueprint for shaping the collaboration without creating long-term dependency.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Catalyst?</h3><p>The <em><strong>Catalyst</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>Someone who brings external expertise in building AppSec ownership within your company.</p></blockquote><p>This includes:</p><ul><li><p>AppSec consultants or guides</p></li><li><p>AppSec trainers</p></li></ul><p>This is, of course, not an exhaustive list and you may find these boundaries useful in other contexts outside of AppSec as well. </p><div class="pullquote"><p>If you are currently looking for AppSec guidance, feel free to reach out. I&#8217;m committed to keeping you independent. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.appsec-adventure.com/contact&quot;,&quot;text&quot;:&quot;Contact me&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.appsec-adventure.com/contact"><span>Contact me</span></a></p></div><h3>What AppSec domains can the Catalyst support?</h3><p>The Catalyst can&#8217;t own AppSec domains, they can only support. So here&#8217;s what they can focus on:</p><blockquote><p><strong>Security Tooling</strong> | <em>Provide current market insights on what solutions are available and how to select and integrate tools to support your team.</em></p></blockquote><p>A good guide is independent. That means they don&#8217;t work with just one vendor, but help you choose something that fits your needs individually.</p><blockquote><p><strong>Security Strategy</strong> | <em>Provide guidance in navigating the complexity of AppSec.</em></p></blockquote><p>This includes setting up processes for <strong>Vulnerability Management</strong> and <strong>Incident Readiness</strong>, and providing resources to customize for every AppSec domain.</p><blockquote><p><strong>Security Culture</strong> | <em>Provide guidance for building a strong security culture and a company-wide security champions program.</em></p></blockquote><p>A good guide knows how important culture is and will help you build an AppSec program that is centered around your developers, not your security team.</p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What is the Catalyst accountable for?</h3><p>Here&#8217;s what you can hold your Catalyst accountable for:</p><ul><li><p>Coaching the AppSec lead and acting as a strategic sparring partner.</p></li><li><p>Reviewing and advising on tooling, processes, and structural decisions.</p></li><li><p>Spotting blind spots, challenging assumptions, and providing external validation.</p></li><li><p>Supporting the setup of a scalable AppSec strategy and guidance for developing a strong security culture.</p></li><li><p>Providing best practices, templates, and playbooks to accelerate internal decision-making.</p></li><li><p>Maintaining external perspective and bringing in relevant market, tooling, or ecosystem insights.</p></li></ul><h3>What accountability must stay internally?</h3><p>Here&#8217;s what you must strictly own internally:</p><ul><li><p>Delivering or owning policies, findings, or operational outcomes.</p></li><li><p>Acting as a direct contact for developers or security champions.</p></li><li><p>Taking over operational responsibilities within product or security teams.</p></li><li><p>Creating dependencies or acting as a &#8220;shadow AppSec lead&#8221;.</p></li></ul><p>If you let a consultant take ownership of these areas, you&#8217;ll become dependent on them in the long run. They can support you, but you must be careful not to externalize accountability.</p><h3>Who does the Catalyst work with?</h3><p>There is only one role the Catalyst should work with:</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-owner">Owner</a> </strong>(e.g., AppSec lead) <strong>| </strong><em>Only with a clear mandate and by invitation.</em></p></blockquote><p>They may work with interim stakeholders (e.g., CTO or an architect) during the initial phase to facilitate alignment and prepare for the takeover of an internal owner. If there is no internal owner, appointing one should be the highest priority.</p><p>They can work with other roles initially, e.g., as a trainer for software developers, but this should not turn into a long-term dependency and shouldn&#8217;t happen without the Owner&#8217;s explicit approval. </p><div class="pullquote"><p><em>The <strong>Catalyst</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Role: The Advocate]]></title><description><![CDATA[For security champions: here's what you own in application security and what explicitly not.]]></description><link>https://blog.appsec-adventure.com/p/role-the-advocate</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-advocate</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 13:04:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a thin line between a healthy and an unhealthy security champions role. Being expected to do all the security work might be as bad and frustrating as having no voice and mandate at all. This deep dive into the <em><strong>Advocate</strong></em> role sets clear boundaries and expectations for a healthy security champion role.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Advocate? </h3><p>The <em><strong>Advocate</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>A developer who&#8217;s interested in security and has deepened their security knowledge.</p></blockquote><p>A security champions program is a decentralized approach to extend your central AppSec team with people embedded in development teams that advocate for security and act as a bridge between teams. Anyway, we should never forget that they are mainly developers, not security staff. </p><h3>What AppSec domains does the Advocate own?</h3><p>As the Advocate, you focus on the two AppSec domains you already own as an <strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-executor">Executor</a></strong>, plus one additional domain:</p><blockquote><p><strong>Secure Design | </strong><em>Drive threat modeling exercises and ask security-related questions.</em></p></blockquote><p>This domain is already one of your main focus areas as developer, but as Advocate you are expected to wear the security head in every design-related action and support your team with your security expertise. </p><blockquote><p><strong>Secure Coding | </strong><em>Spread security knowledge within the team and pay special attention to code reviews and the security-related test cases.</em></p></blockquote><p>I can&#8217;t stress enough that you don&#8217;t need to do everybody&#8217;s security work. Don&#8217;t write everyone&#8217;s tests, but point out if security-related test cases are missing. As the Advocate, your main task is awareness and support, not compensation for other people&#8217;s bad habits.</p><blockquote><p><strong>Security Culture | </strong>Drive secure behavior within the team by being a role model and advocating for security.</p></blockquote><p>Everyone can shape culture, but as the Advocate, your passion for security naturally serves this purpose. Cultural change is all about behavior and with you being a role model, you can inspire your peers to improve for themselves. </p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What AppSec domains does the Advocate support?</h3><p>Being the Advocate for security comes with additional responsibilities and opportunities to shape your company&#8217;s AppSec program. While you don&#8217;t own every single domain, you can contribute to all of them.</p><blockquote><p><strong>Security Tooling | </strong><em>Provide valuable feedback on usability and raise recurring needs.</em></p></blockquote><blockquote><p><strong>Security Strategy | </strong><em>Provide feedback and insights from day-to-day development to guide improvements based on real-world needs.</em></p></blockquote><p>Your AppSec lead needs your feedback to shape the AppSec program in a direction that actually serves the developers. As you are still part of the development team, you&#8217;re best positioned to ensure they have the right context to decide which tools to provide and which strategy to follow.</p><blockquote><p><strong>Incident Readiness | </strong><em>Act as a point of contact for incident triage within the team and help identify the right people to support technical analysis.</em></p></blockquote><p>When things go south, you are maybe best suited as support for the AppSec team to figure out what is going on and make sure your product is safe again soon. That doesn&#8217;t mean you&#8217;re meant to lead the process. </p><blockquote><p><strong>Vulnerability Management | </strong><em>Support your project leader and highlight recurring patterns for proactive improvement.</em></p></blockquote><p>You can support your project leaders when they don&#8217;t know how risky certain issues are or how much effort it will take to remediate them. You are invited to look for patterns and suggest improvements in and across teams.</p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><h3>What is the Advocate accountable for?</h3><p>Here&#8217;s what you can hold yourself accountable for:</p><ul><li><p>Supporting developers in applying secure practices and improving their skills.</p></li><li><p>Bringing security topics into daily work and team discussions.</p></li><li><p>Facilitating basic threat modeling and secure design thinking.</p></li><li><p>Identifying security gaps that need central guidance or structural fixes.</p></li><li><p>Providing input on the usability of tools and e&#64256;ectiveness of guidance.</p></li><li><p>Sharing team-level insights on recurring needs and repeated issues with the AppSec lead.</p></li></ul><p>View this list as an all-you-can-eat menu. These are areas where you can do more. You can start small with improving your own security-related skills and build a strong security community together with other Advocates. Nobody expects you to know and solve it all on your first day. </p><h3>What is the Advocate NOT accountable for?</h3><p>Here&#8217;s what you are explicitly not expected to do:</p><ul><li><p>Taking over security responsibilities from other team members.</p></li><li><p>Replacing the project leader in planning or prioritization.</p></li><li><p>Implementing or enforcing central security measures.</p></li><li><p>Making policy decisions or setting global standards.</p></li><li><p>Leading incident response independently without coordination.</p></li><li><p>Acting as permanent substitutes for the AppSec lead.</p></li></ul><p>While the first list was the tasty menu you could choose from, this list is the &#8216;don&#8217;t eat that shit&#8217; list. Eating toxic mushrooms won&#8217;t serve you well. If your security champions program expects those things, push back hard. That&#8217;s the path to an unhealthy security champion role you don&#8217;t want to carry.</p><h3>Who does the Advocate escalate to?</h3><p>As the Advocate, there are two roles you can escalate to: </p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-gatekeeper">Gatekeeper</a> </strong>(e.g., project leader)<strong> | </strong><em>For team-internal issues that block secure development, e.g. missing capacity, unclear ownership, or lack of priority.</em></p></blockquote><p>This is your main escalation path as a developer anyway, so you can still use it to escalate security-related issues within your daily work and team.</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-owner">Owner</a> </strong>(e.g., AppSec lead<strong>) | </strong><em>For issues that require structural support, central guidance, or cannot be resolved within the team, as well as any conflicts, they may not solve locally.</em></p></blockquote><p>The Owner should have your back and is your central point of contact when things can&#8217;t be solved locally. They should be in contact with the executive leadership, so they are can further escalate things if necessary. </p><p>In emergency cases, you as the Advocate may help coordinate local response efforts or step in when the Owner is unavailable, based on predefined rules. However, this is not your primary responsibility and should be clearly scoped.</p><p>Finally, you can always escalate to your security champion community. You are not fighting and advocating alone. You hopefully have your community and network to support your local efforts, learn from each other and have fun. </p><div class="pullquote"><p><em>The <strong>Advocate</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Role: The Backbone]]></title><description><![CDATA[For executive leadership: here's how to safely delegate and still support your application security initiative.]]></description><link>https://blog.appsec-adventure.com/p/role-the-backbone</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-backbone</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 12:27:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As an executive leader of your company, you are ultimately accountable for application security. I know that. You know that. This deep dive on the <em><strong>Backbone</strong></em> role clarifies what you can safely delegate and where your team needs your support. </p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Backbone?</h3><p>The <em><strong>Backbone</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>Everyone steering the company at the highest level.</p></blockquote><p>This includes:</p><ul><li><p>Any C-suite roles</p></li><li><p>CISOs</p></li></ul><p>This is of course not an exhaustive list. Anyway, within the model, they are all grouped together because from an AppSec point of view, their contribution and accountability is pretty similar. </p><h3>What AppSec domains does the Backbone own?</h3><p>As the Backbone, you need to focus on two AppSec domains:</p><blockquote><p><strong>Security Strategy</strong> | <em>Own strategic direction, ensure alignment with business goals, and make final decisions on investment and risk.</em></p></blockquote><blockquote><p><strong>Security Culture</strong> | <em>Lead by example and embed security into organizational values.</em></p></blockquote><p>You will need to find an AppSec lead to own your AppSec initiative at an operational level. They should be enabled and trusted to come up with a solid security strategy, but the final decision is yours. </p><p>In addition, you must be serious about AppSec yourself, otherwise your AppSec lead has no chance to shape and nurture a good security culture. </p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What is the Backbone accountable for?</h3><p>Here&#8217;s what you can hold yourself accountable for:</p><ul><li><p>Approving the overall security strategy and investment decisions.</p></li><li><p>Supporting the AppSec lead with clear mandate and organizational backing.</p></li><li><p>Ensuring that security priorities are reflected in business planning and governance.</p></li><li><p>Leading by example and reinforcing security culture through visible commitment.</p></li><li><p>Taking responsibility for accepted risk at organizational level.</p></li></ul><h3>What should the Backbone delegate?</h3><p>Here&#8217;s what you should delegate:</p><ul><li><p>Defining technical security standards or tooling.</p></li><li><p>Managing day-to-day application security execution.</p></li><li><p>Performing reviews, risk ratings, or technical assessments.</p></li><li><p>Communicating directly with product teams on implementation details.</p></li></ul><h3>Who does the Backbone work with?</h3><p>As the Backbone, there are only two roles you need to work with regularly:</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-owner">Owner</a></strong> (e.g., AppSec lead)<strong> | </strong><em>For strategic alignment and decision preparation.</em></p></blockquote><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-gatekeeper">Gatekeeper</a> </strong>(e.g., project leaders)<em> </em><strong>| </strong><em>For prioritization and risk visibility within projects.</em></p></blockquote><p>You may also work with your security champions (<strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-advocate">Advocate</a></strong>) indirectly by enabling a culture that values their contributions.</p><div class="pullquote"><p><em>The <strong>Backbone</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Role: The Owner]]></title><description><![CDATA[For AppSec leaders: here's what you own, and what you should delegate to stay sane.]]></description><link>https://blog.appsec-adventure.com/p/role-the-owner</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-owner</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 12:16:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Taking ownership of your company&#8217;s application security can be a fulfilling mission, but it can burn you out quickly if you&#8217;re not careful. This deep dive on the <em><strong>Owner</strong></em> role sets clear boundaries around what you can take on and what you must strictly delegate.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Owner?</h3><p>The <em><strong>Owner</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>The person who takes ownership of AppSec and mainly drives the initiative.</p></blockquote><p>This includes:</p><ul><li><p>AppSec lead <em>(operational owner)</em></p></li><li><p>AppSec teams <em>(shared responsibility)</em></p></li><li><p>CISO / C-suite <em>(strategic fallback if no dedicated owner exists)</em></p></li></ul><p>One could argue that ownership ultimately lives within the executive leadership, but for the sake of this model, we refer to the person who mainly drives and represents AppSec within the company.</p><h3>What AppSec domains does the Owner own?</h3><p>As the Owner, you mainly focus on four AppSec domains:</p><blockquote><p><strong>Security Strategy | </strong><em>Define the overall strategy with long-term goals and KPIs to measure progress.</em></p></blockquote><p>The strategy needs to be aligned with business goals and approved by the executive leadership <em>(</em>Backbone<em>)</em>. Close collaboration between both roles is absolutely necessary.</p><blockquote><p><strong>Security Tooling | </strong><em>Select and configure security tools in alignment with the overall strategy.</em></p></blockquote><p>This includes anything from scanners to vulnerability management platforms or runtime protection. The requirements for each tool should be derived from the base in collaboration with the development teams.</p><blockquote><p><strong>Incident Readiness | </strong><em>Define and train processes for incident response and zero-day vulnerabilities.</em></p></blockquote><p>As the Owner you should provide process definitions, templates and checklists, as well as detection mechanisms. Everything that saves time and reduces error under pressure. Of course these structures need to be built and derived from the operational reality. </p><blockquote><p><strong>Security Culture | </strong><em>Detect cultural threats and actively shape cultural change.</em></p></blockquote><p>A strong security culture will make every other effort you take more efficient and sustainable. Nobody can change culture alone, but someone must attempt to shape it with intention and a plan, one step at a time. </p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What AppSec domains does the Owner support?</h3><p>As the Owner, you&#8217;re involved in all domains. These are the remaining domains, you only support:</p><blockquote><p><strong>Secure Design &amp; Secure Coding | </strong><em>Define standards and provide best practices for secure design and coding.</em></p></blockquote><blockquote><p><strong>Vulnerability Management | </strong><em>Define the process and prioritization rules based on risk.</em></p></blockquote><p>All these domains must be mainly driven by the development teams, as you won&#8217;t have capacity or know all the details to own them. They are the main trap where AppSec leads burn themselves out when they take on too much in those areas. Make sure you strictly separate between operational details and defining structure. </p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><h3>What is the Owner accountable for?</h3><p>Here&#8217;s what you can hold yourself accountable for:</p><ul><li><p>Designing and evolving the AppSec strategy, including roles, responsibilities, policies, and processes.</p></li><li><p>Making structural decisions on security tooling, training programs, and cross-team standards.</p></li><li><p>Prioritizing global security e&#64256;orts based on input from teams, risk exposure, and business impact.</p></li><li><p>Defining how threat modeling, vulnerability management, and risk acceptance are handled across teams.</p></li><li><p>Defining roles and responsibilities within the incident response process and ensuring readiness across involved teams.</p></li><li><p>Enabling security champions through clear guidance, training resources, and structured feedback.</p></li><li><p>Ensuring continuity of strategic AppSec leadership, including defined delegation in case of absence.</p></li><li><p>Supporting awareness and compliance activities in alignment with strategic goals.</p></li><li><p>Defining relevant KPIs for application security and regularly reporting them to the executive leadership.</p></li><li><p>Actively aligning AppSec goals with business priorities, customer value, and delivery strategy through regular collaboration with the management.</p></li><li><p>Temporarily owning unstructured security gaps to prevent risk blind spots with the explicit goal of transitioning them into stable ownership based on field experience.</p></li></ul><p>I know the list is long. If possible, these accountability should be shared by an AppSec team. If you&#8217;re alone, make sure you are extra strict in what to prioritize and what to reject at least for the moment. Nobody wins when you ignore your limits and eventually need to give up. </p><h3>What is the Owner NOT accountable for?</h3><p>There are certain operational things you need to delegate because you just can&#8217;t handle them. </p><p>Here&#8217;s what you are explicitly NOT accountable for:</p><ul><li><p>Fixing vulnerabilities, reviewing code, or directly supporting delivery teams operationally.</p></li><li><p>Leading operational incident response unless specifically defined as part of the process.</p></li><li><p>Making final decisions on budget, procurement, or staffing (that belong to executive leadership).</p></li><li><p>Taking over prioritization decisions that belong to product or project management.</p></li><li><p>Owning team-level backlogs or covering missing security champions in delivery teams.</p></li><li><p>Acting as a full-time trainer or one-on-one coach for teams.</p></li></ul><p>There are other roles accountable for those tasks. If you notice they don&#8217;t own their part, help them understand why they must and ask the Backbone to support you up if necessary. </p><h3>Who does the Owner escalate to?</h3><p>If you find yourself confronted with tasks, that should not be on your desk, you have two options for escalation: </p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-gatekeeper">Gatekeeper</a> </strong>(e.g., project leaders)<strong> | </strong><em>When security goals are blocked by planning constraints or business pressure.</em></p></blockquote><p>Use this path when KPIs are not met to figure out why they failed and how they can be supported, to get back on track. Don&#8217;t take over for them, just ask and lead them back on track.</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-backbone">Backbone</a> </strong>(e.g., executive leadership) <strong>| </strong><em>For structural conflicts and priority trade-offs.</em></p></blockquote><p>Use this path when you run into conflicts with the project leaders and their teams. When you can&#8217;t find solutions locally, call your Backbone for support. They ultimately decide if security is their first business priority in that specific case or if there are reasons to prioritize output. In that case, ask them to address the security requirements in their plan, with a clear near-term deadline.</p><h3>Who does the Owner work with?</h3><p>Apart from escalation, there are three roles that the Owner can work with:</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-backbone">Backbone</a> </strong>(e.g., executive leadership)<strong> | </strong><em>For budget and strategy decisions related to AppSec capabilities.</em></p></blockquote><p>The Owner should report at least quarterly directly to management to keep them informed. There should be a quick way to get their feedback or smaller decisions in between to reduce friction. This collaboration is the necessary foundation.</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-advocate">Advocate</a> </strong>(e.g., security champions)<strong> | </strong><em>They lead the security champions program, which provides direct feedback from the base.</em></p></blockquote><p>The Owner will usually lead the security champions program at least in the beginning. Later the security champions might be able to sustain the program themselves, but the Owner still needs to stay in touch with them. They are probably their best connection to the development teams to get honest feedback, needs and requirements to support development teams best. </p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-catalyst">Catalyst</a> </strong>(external/optional)<strong> | </strong><em>Whenever they need access to deeper expertise, external validation or strategic sparring partner support.</em></p></blockquote><p>The Catalyst can be any external coach or consultant that usually works exclusively with the Owner without taking ownership away from them. </p><div class="pullquote"><p><em>The <strong>Owner</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Role: The Gatekeeper]]></title><description><![CDATA[For project leaders: Enable secure development without slowing your team down.]]></description><link>https://blog.appsec-adventure.com/p/role-the-gatekeeper</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-gatekeeper</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 11:43:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Security has a bad reputation for slowing teams down. Sometimes that&#8217;s deserved. We call it security theater. This deep dive on the <em><strong>Gatekeeper</strong></em> role is about using your power to make room for security that matters and cut the bullshit.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Gatekeeper?</h3><p>The <em><strong>Gatekeeper</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>The person who sets product direction and protects the team&#8217;s ability to execute.</p></blockquote><p>This includes:</p><ul><li><p>Project leaders</p></li><li><p>Product owners</p></li><li><p>Scrum masters</p></li></ul><p>This is of course not an exhaustive list. Anyway, within the model, they are all grouped together because from an AppSec point of view, their task is to ensure the product gets developed. This can naturally create conflict with security requirements and that&#8217;s expected. The Gatekeeper should be critical and observant if those requirements actually improve the overall security of their product or if they just slow down their team without meaningful impact. </p><h3>What AppSec domains does the Gatekeeper own?</h3><p>As the Gatekeeper, you need to focus on only one AppSec domain:</p><blockquote><p><strong>Vulnerability Management | </strong><em>Prioritize remediation of vulnerabilities while balancing other demands.</em></p></blockquote><p>Vulnerability remediation, bug fixes, or new feature requests? All of them need time and focus from your team to improve the product. As the Gatekeeper, it&#8217;s your job to make sure priorities are chosen well. As with bugs, some vulnerabilities might be something you can ignore while others need immediate attention. You are not expected to do the assessment and decide, which vulnerabilities need to get fixed on your own. There should be standards, rules, and tools in place to support you. Anyway, finding the right balance between bug fixes, remediation and feature requests is your game.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What AppSec domains does the Gatekeeper support?</h3><p>If you cut security work entirely, you can sabotage the effectiveness of the AppSec initiative. Killing security theater is good. Killing useful security work isn&#8217;t.</p><p>Your team needs time and resources to handle their security duties in a meaningful way. Therefore they need you to actively support them in their domains:</p><blockquote><p><strong>Secure Design &amp; Secure Coding | </strong><em>Provide time and space for secure design and coding activities.</em></p></blockquote><p>Listen to your team when they initiate security-related activities. When they need to talk about design instead of jumping right into implementation, this will benefit your product and save time in the long run. Trust them. </p><blockquote><p><strong>Incident Readiness | </strong><em>Coordinate delivery-side impact and communication.</em></p></blockquote><p>In addition, you play an important role when incidents hit, as you are the one who can see the impact on your timelines and communicate accordingly with impacted stakeholders. </p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><h3>What is the Gatekeeper accountable for?</h3><p>Here&#8217;s how you ensure meaningful security takes place in your project:</p><ul><li><p>Ensuring that security requirements are clearly defined for every delivery.</p></li><li><p>Ensuring that security-related tasks are properly included in planning and delivery.</p></li><li><p>Prioritizing vulnerability remediation against feature and bug requests.</p></li><li><p>Making security trade-o&#64256;s visible and discussing them openly.</p></li><li><p>Escalating when security is deprioritized without conscious risk acceptance.</p></li><li><p>Supporting incident coordination and communication if the situation a&#64256;ects delivery or customers.</p></li></ul><h3>What is the Gatekeeper NOT accountable for?</h3><p>You don&#8217;t need to become the security expert. Vulnerabilities should be pre-assessed or at least you should have rules and standards at hand that help you sort quickly through them without guessing risk. </p><p>Here&#8217;s what you are not accountable for:</p><ul><li><p>Defining detailed security requirements or implementation details.</p></li><li><p>Deciding on technical severity or exploitability of findings.</p></li><li><p>Defining risk based standards or deadlines for vulnerability remediation prioritization.</p></li></ul><p>That information should be presented by either your development team or the AppSec team. If it&#8217;s missing, ask for it.</p><h3>Who does the Gatekeeper escalate to?</h3><p>If you struggle to decide whether certain security activities are meaningful or if certain vulnerabilities should be remediated in the next delivery period, you have two roles to support your decision-making.</p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-advocate">Advocate</a> </strong>(e.g., security champions)<strong> | </strong><em>For technical input, missing context, or when support is needed to understand the impact of a security issue.</em></p></blockquote><p>For the small details, security champions are the perfect partner to discuss details with. They are developers with security expertise and can help you decide on a day to day basis. If your company doesn&#8217;t run a security champions program, just ask experienced developers. You likely know best who might be able to answer your questions. </p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-owner">Owner</a> </strong>(e.g., AppSec lead)<strong> | </strong><em>For unclear security priorities, accepting known risk or when security work falls short due to delivery deadlines.</em></p></blockquote><p>The second point of contact is your AppSec lead or team. When general guidance or tools are missing and you think you need structural level support, the Owner is the right person to contact. If there is no dedicated owner yet, escalate it to your management, as they implicitly own what is not explicitly delegated. </p><p>If at a certain point security requirements and delivery requirements can not be balanced properly, you may need to escalate and let this decision be made on a higher level. You can escalate jointly with the AppSec lead to the executive leadership in case the risk acceptance needs to be approved. Anyway, remember that all accepted risks must be documented, made visible to all stakeholders, and scheduled for remediation. </p><div class="pullquote"><p><em>The <strong>Gatekeeper</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Role: The Executor]]></title><description><![CDATA[For software developers and architects: here's what you own in application security and what you support.]]></description><link>https://blog.appsec-adventure.com/p/role-the-executor</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/role-the-executor</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 11:11:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Implicit and unrealistic expectations are the main reasons why software developers struggle to meet security requirements. This deep dive on the <strong>Executor</strong> role aims to clarify accountability and set realistic expectations to bridge the gap between development and security folks.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Who is the Executor?</h3><p>The <em><strong>Executor</strong></em> is one of six roles within the <em><strong>AppSec Ownership Model</strong></em> and refers to:</p><blockquote><p>Everyone who actively shapes the software product by design or by writing code.</p></blockquote><p>This includes:</p><ul><li><p>Software developers</p></li><li><p>Software architects</p></li><li><p>Dev(Sec)Ops <em>(if we think of infrastructure as code)</em></p></li></ul><p>This is of course not an exhaustive list. Anyway, within the model, they are all grouped together because from an AppSec point of view, their contribution and accountability are pretty similar. </p><p>In practice, their focus may shift within their field of accountability as they execute different tasks within their software development lifecycle. </p><h3>What AppSec domains does the Executor own?</h3><p>As the Executor, you need to focus on two AppSec domains:</p><blockquote><p><strong>Secure Coding</strong> | <em>Write secure, maintainable code in your daily work.</em></p></blockquote><blockquote><p><strong>Secure Design</strong> | <em>Lead secure design decisions within your project scope.</em></p></blockquote><p>If you are a software developer, you may focus less on secure design than an architect, but as a development team, you collectively own those two AppSec domains. You&#8217;re the only role that can truly own these domains, because you know your product best.</p><p>While you are the expert for your code, you may not be the security expert. We will figure out within the accountability section how the security team can support you within your domains.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>What AppSec domains does the Executor support?</h3><p>When developing secure software is the main goal of application security, it naturally fails when you are no longer able to develop software in the first place. That&#8217;s why the whole AppSec program should be built to support and enable the Executor role.</p><p>And again, this can&#8217;t be done without you, as the Executor. You know what works best for you and what slows you down. That&#8217;s why your feedback is necessary to shape the AppSec program within your company. </p><p>Here are three additional domains where you should actively support:</p><blockquote><p><strong>Security Tooling</strong> | <em>Use tools and provide feedback on any friction.</em></p></blockquote><p>Tell your security team or project leader, whether the tools actually serve you on a daily basis. Be concrete on what slows you down. </p><blockquote><p><strong>Vulnerability Management</strong> | <em>Remediate vulnerabilities in daily work based on project priorities.</em></p></blockquote><p>In a perfect world, remediation should be scheduled within your project, but in case it&#8217;s not: fix whatever comes your way whenever it is suitable. </p><blockquote><p><strong>Incident Readiness</strong> | <em>Detect and report suspicious behavior or unexpected system states.</em></p></blockquote><p>Detecting incidents early can reduce damage along the way. Often there won&#8217;t be automatic tools in check of they will just not cover everything. Trust your guts when something seems off and address it. It&#8217;s better to be wrong than to let an ongoing attack slip through. </p><p>All three of them are owned by other roles within your organization, but your contribution can shape and improve their work. </p><p>Now that you see the bigger picture, let&#8217;s make accountability explicit.</p><h3>What is the Executor accountable for?</h3><p>Here&#8217;s what you can hold yourself and your team accountable for:</p><ul><li><p>Designing secure systems right from the start, not fixing security somehow later.</p></li><li><p>Using approved tools in the development workflow (e.g. linters, scanners).</p></li><li><p>Asking for clarification when security requirements are missing or unclear.</p></li><li><p>Writing secure, maintainable code based on best practices.</p></li><li><p>Actively identifying knowledge gaps and improving your secure coding skills.</p></li><li><p>Writing meaningful tests, including security-relevant scenarios.</p></li><li><p>Reviewing code from a security and quality perspective.</p></li><li><p>Selecting appropriate libraries and avoiding insecure packages.</p></li><li><p>Keeping dependencies up to date, or flagging outdated ones until they&#8217;re fixed.</p></li></ul><div class="pullquote"><p><strong>Honestly ask yourself:</strong> Do you meet all of them? Where can you or your team improve?</p></div><h3>What is the Executor NOT accountable for?</h3><p>If AppSec responsibility is not clearly distributed within your company, you may feel responsible to fill in the blanks that are just out of scope for you. </p><p>So, here&#8217;s what you are NOT accountable for:</p><ul><li><p>Defining tooling strategy or security policies.</p></li><li><p>Making final decisions on risk, severity, or remediation scope.</p></li><li><p>Coordinating security initiatives across teams.</p></li><li><p>Coordinating incident response.</p></li></ul><p>In practice, whenever you are confronted with expectations or responsibility in those areas (e.g., in an emergency), you can take over, but you should be aware that this is not what your role is expected to do and it&#8217;s nothing you should take over in the long run. If those gaps exist, they need to be addressed by your organization on a higher level. </p><h3>Who does the Executor escalate to?</h3><p>As the Executor, there are only two roles you are expected to escalate to: </p><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-advocate">Advocate</a></strong> (e.g., security champions) | <em>For technical questions, missing guidance, tool-related issues or anything that feels security-relevant but cannot be solved locally.</em></p></blockquote><blockquote><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-gatekeeper">Gatekeeper</a> </strong>(e.g., project leaders) | <em>For priorities, backlog planning, dependency updates, or e&#64256;orts that need coordination within the team.</em></p></blockquote><p>If your organization doesn&#8217;t have security champions, you may need to escalate directly to your security team or try to solve everything with your project leader.</p><div class="pullquote"><p><em>The <strong>Executor</strong> is one of six roles within the <strong>AppSec Ownership Model</strong>, which defines clear accountability for everyone involved in developing secure software. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Background: Why secure software development depends on six roles]]></title><description><![CDATA[For AppSec Leads: Understand the perspective behind the AppSec Ownership Model and validate it for yourself]]></description><link>https://blog.appsec-adventure.com/p/background-why-secure-software-development</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/background-why-secure-software-development</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 10:29:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>At first glance developing secure software may only involve developers and the security team, but this view is too short. If you want to understand why the <em><strong>Application Security Ownership Model</strong></em> is built on six roles, here&#8217;s where you find the background story. You can use it as a compass to validate if this approach is for you.</p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Why control doesn&#8217;t work</h3><p>The old way to do security was based on control. Someone decided who can be trusted, what behavior is acceptable and what needs to be blocked entirely. This approach has one big problem: it works on paper, but is often far from reality. It can actually harm your company&#8217;s core business if software developers are no longer able to develop software. At least not efficiently. </p><h3>What actually works</h3><p>Trust works. Freedom works. Collaboration works. </p><p>Don&#8217;t treat your software developers as one of the biggest threats to a secure product. In fact, they can be your biggest asset. Most developers aren&#8217;t trying to build insecure products. They are not the ultimate evil you need to protect against. Often, they just miss security knowledge, are pushed by deadlines and kept on a short leash to not think for themselves. Often security is just getting in their way instead of actually enabling them to build a secure product. That&#8217;s what we need to fix. </p><h3>Who is involved in developing secure software?</h3><p>The developer is building the product. The product is what brings your company money and pays for your paycheck. So I think we can agree that the main character in software development is the software developer. Without someone actually writing code, there will be no product to secure. They drive the software development lifecycle (SDLC). Within the AppSec Ownership Model, I call them the <em><strong>Executor</strong></em>. </p><p>Of course, you as the AppSec Lead want them to build secure software, thus turning their SDLC into a <em>secure </em>SDLC. You are the <em><strong>Owner</strong></em>. You educate them. You trust them. You help them to change their behavior. You provide them with everything they need to do their duty. </p><p>But there is one person who gets in your way. The project leader is responsible for managing time and resources. They are the <em><strong>Gatekeeper</strong></em>. It&#8217;s their job to ensure their team&#8217;s time is spent well, so you need to convince them or they will just not let you interfere with their team. They are a valuable asset to you, too. They can help you build security that serves their team, as they will tell you to your face when you expect bullshit tasks from them or their team. </p><p>You may find Gatekeepers who are open to work with you, but some may be harder to convince or just refuse to collaborate at all. To get them in line, you need a strong <em><strong>Backbone</strong></em>. Without support from the executive leadership, you will fail. </p><p>That&#8217;s the bare minimum. Four roles. </p><h3>How to change behavior</h3><p>The fifth role is the <strong>Advocate</strong>. When you start your AppSec initiative, you won&#8217;t have a structured security champions program, but you will for sure have some secret champions already advocating for security. It doesn&#8217;t matter if they have an official mandate yet or if they just do what they do. You need them. </p><p>Developing a strong security culture is what makes your AppSec program sustainable, but it&#8217;s hard to achieve. It&#8217;s a long journey, but it starts with one intentional step. Changing culture means changing behavior. And your security champions already are role models in what good secure behavior may look like. By building a strong security champions program, you already are on the path to that strong security culture. You just need to keep going and trust the process. </p><h3>How to speed things up</h3><p>No, I&#8217;m sorry. I don&#8217;t have the secret hack to speed up your culture development. But you can speed up your own learning curve as the Owner and reduce your trial-and-error cycles, which will get you moving faster. </p><p>We are talking about external expertise. Whenever you hire a coach or consultant, you leverage their experience to learn faster and avoid mistakes they already made. While this can be a big opportunity, it can also be a trap. If you externalize accountability you make yourself dependent on them. That&#8217;s why we cover the Catalyst role as the sixth role within the AppSec Ownership Model. The role is optional, but if you choose to use it, you need to know how to avoid the trap and stay independent.</p><div class="pullquote"><p>If you are currently looking for AppSec guidance, feel free to reach out. I&#8217;m committed to keeping you independent. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.appsec-adventure.com/contact&quot;,&quot;text&quot;:&quot;Contact me&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.appsec-adventure.com/contact"><span>Contact me</span></a></p></div><h3>How to get started</h3><p>We covered all six roles involved in developing secure software. If my point of view resonates with you, feel free to explore the AppSec Ownership Model and use it to clarify accountability within your AppSec program. Accountability is the foundation that everything else is built on.</p><p>This model is grounded in my personal experience and I&#8217;m more than happy to discuss it with other practitioners who are committed to building security for the real world, not just on paper. </p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Background: Defining the AppSec scope]]></title><description><![CDATA[For AppSec Leads: Dive into the seven domains within the AppSec Ownership Model]]></description><link>https://blog.appsec-adventure.com/p/background-defining-the-appsec-scope</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/background-defining-the-appsec-scope</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 10:07:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vjEu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0539c4d-cf0c-4ddd-9697-103967740b84_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There are many measures you can include in your SDLC to make it secure. Within the <em><strong>Application Security Ownership Model</strong></em>, I grouped them into seven domains. This is not meant to be a complete list. It should just enable you to put your measures into the right domain so you can map them to the right owner. </p><div class="pullquote"><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web&quot;,&quot;text&quot;:&quot;Explore the AppSec Ownership Model&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/appsecadventure/p/application-security-ownership-model?r=7ax7oy&amp;utm_campaign=post&amp;utm_medium=web"><span>Explore the AppSec Ownership Model</span></a></p></div><h3>Overview </h3><p>Within the AppSec Ownership Model we split the AppSec field into seven domains:</p><ol><li><p>Secure Design</p></li><li><p>Secure Coding</p></li><li><p>Security Tooling</p></li><li><p>Vulnerability Management</p></li><li><p>Incident Readiness</p></li><li><p>Security Strategy</p></li><li><p>Security Culture</p></li></ol><p>We will now dive into each of them to provide you with a rough idea of what they are about and where to start.</p><h3>Secure Design</h3><p>You probably heard about shifting left. This means adding security as early as possible in your SDLC. And the earliest phase is your design phase, so that&#8217;s where we start. You probably already learned it the hard way that any big flaws in your design are the hardest to fix later.</p><p>Here are some measures you can implement:</p><ul><li><p>Threat Modeling</p></li><li><p>Secure Design Principles</p></li><li><p>Security Requirements</p></li></ul><p>If you are dealing with a lot of legacy, start by thinking about security requirements for every new feature and adding them to your acceptance criteria.</p><h3>Secure Coding</h3><p>When I studied computer science, security was barely touched upon. I hope this is going to change in the future, but for now companies need to fill the gap. Instead of treating developers as the threat that needs to be controlled, companies should train them properly in secure coding.</p><ul><li><p>Define guidelines and standards</p></li><li><p>Offer continuous training opportunities</p></li><li><p>Perform code reviews</p></li></ul><p>It&#8217;s easy to tell developers to write secure code, but you need to make explicit what secure means to you. Whatever measures you take, make sure they match developers&#8217; reality, and involve them in developing these standards.</p><h3>Security Tooling</h3><p>When I was handed responsibility for AppSec, one of the first requirements was: &#8216;Find us a good SAST scanner&#8217;. While this sounds good on paper, it would have filled backlogs and created a lot of noise, but it wouldn&#8217;t have really improved the products. </p><p>There are many different tools you could add:</p><ul><li><p>Scanners (SCA, SAST, DAST)</p></li><li><p>Vulnerability Management Platforms (ASPM)</p></li><li><p>Runtime Protection (WAF)</p></li></ul><p>Whatever you include, make sure it reduces friction, is properly configured and frees up capacity for feature development. Tools should be added with intention and be included in processes where they actually improve something. </p><h3>Vulnerability Management</h3><p>I would go for a proper vulnerability management process first, before adding new tools. Developers are often aware of vulnerabilities or outdated dependencies, but they might have learned that fixing those issues is not a priority. </p><p>Define the process and show them that fixing vulnerabilities matters:</p><ul><li><p>Reduce the noise</p></li><li><p>Prioritize what actually matters</p></li><li><p>Fix it</p></li></ul><p>Start small. Take the vulnerabilities they already know, establish a process, and add more vulnerability detection afterwards. It&#8217;s a never-ending story, so you&#8217;d better make it a good habit.</p><h3>Incident Readiness</h3><p>No matter how well you are prepared, nothing is 100% secure. You&#8217;ll end up firefighting sooner or later. So of course we need to prepare for the worst case:</p><ul><li><p>Zero-Day Response Process</p></li><li><p>Incident Response Process</p></li><li><p>Responsible Disclosure Process</p></li></ul><p>Start by defining these processes and clarifying responsibilities. Who should be informed? Who is going to lead the process? If you at least have some plan on paper, you have something to work with when you need it. From there you can improve and train your response. </p><h3>Security Strategy</h3><p>With so many measures available, someone needs to have a plan. Developing your AppSec program is pretty individual to your company, but you need for sure some sort of strategy to get where you want to go:</p><ul><li><p>Set long-term goals</p></li><li><p>Fix the current bottleneck</p></li><li><p>Measure your progress</p></li></ul><p>As an AppSec Lead, you need to build your network within the company, collect everybody&#8217;s needs, wants and struggles, sort through that data, come up with a strategy, and finally take it to your management to make sure your AppSec goals are aligned with their business goals. If they reject your strategy, ask why. Try to understand their goals and adjust. </p><h3>Security Culture</h3><p>Maybe the most important long-term goal you should set is to build a strong security culture. If culture works against you, even your best strategy will fail under pressure. Culture is what makes your AppSec program sustainable and resilient. </p><ul><li><p>Identify &#8216;bad habits&#8217;</p></li><li><p>Shape culture with intention and involve everyone</p></li><li><p>Build a Security Champions program</p></li></ul><p>While culture change is by far the biggest challenge you can face, it doesn&#8217;t need to be painful. You will not change culture in one day, month, or year. But you can start small, build healthy security routines and reward desired behavior. And if something fails? Analyze it and adjust. </p><p>There is only one hard criterion under which I would consider this goal failed: if you can&#8217;t get the management behind you, you are fighting an already lost battle. </p><div class="pullquote"><p>If you are currently looking for guidance in one or more domains, feel free to reach out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.appsec-adventure.com/contact&quot;,&quot;text&quot;:&quot;Contact me&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.appsec-adventure.com/contact"><span>Contact me</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Start here: AppSec Ownership Model]]></title><description><![CDATA[Shared responsibility fails without clear accountability.]]></description><link>https://blog.appsec-adventure.com/p/application-security-ownership-model</link><guid isPermaLink="false">https://blog.appsec-adventure.com/p/application-security-ownership-model</guid><dc:creator><![CDATA[Anne Bendix]]></dc:creator><pubDate>Wed, 28 Jan 2026 09:56:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hCY7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>AppSec can&#8217;t be owned by a single role or team. It is therefore only logical to view security as a shared responsibility for everyone. Nevertheless, this approach often fails because accountability is not clearly assigned. </p><p>I came up with the <em><strong>AppSec Ownership Model</strong></em> to create a shared understanding with my client of what AppSec ownership actually means. I wanted to put something that was already clear in my head on paper to build their AppSec program on this foundation. You can&#8217;t address problems if you don&#8217;t know who is accountable for solving them. </p><h3>What is Application Security?</h3><p>What are we actually talking about? Developing secure software? Application Security?</p><blockquote><p><em><strong>Application Security</strong></em> includes every action you take to ensure that the software you build is and remains secure.</p></blockquote><p>The simple reason I came up with this definition is that you need actions to turn an <em>insecure</em> software development lifecycle (SDLC) into a <em>secure</em> SDLC. If you don&#8217;t turn thinking into actions, you are just designing on paper, not in the real world. </p><h3>What makes a SDLC secure?</h3><p>Now that we know what we are talking about. What actually turns the SDLC into a <em>secure</em> SDLC (SSDLC)?</p><p>If you think of AppSec as a big cake, here&#8217;s how I would slice it:</p><ol><li><p>Secure Design</p></li><li><p>Secure Coding</p></li><li><p>Security Tooling</p></li><li><p>Vulnerability Management</p></li><li><p>Incident Readiness</p></li><li><p>Security Strategy</p></li><li><p>Security Culture</p></li></ol><div class="pullquote"><p>If you want to dive into each of the seven domains first, start here:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope&quot;,&quot;text&quot;:&quot;Explore the 7 AppSec Domains&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/appsecadventure/p/background-defining-the-appsec-scope"><span>Explore the 7 AppSec Domains</span></a></p></div><h3>Who needs to take action?</h3><p>I came up with five mandatory roles and one optional role that share AppSec ownership:</p><ol><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-executor">The Executor</a></strong> (e.g., software developers)</p></li><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-owner">The Owner</a></strong> (e.g., AppSec lead)</p></li><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-gatekeeper">The Gatekeeper</a></strong> (e.g., project leaders)</p></li><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-backbone">The Backbone</a></strong> (e.g., executive leadership)</p></li><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-advocate">The Advocate</a></strong> (e.g., security champions)</p></li><li><p><strong><a href="https://open.substack.com/pub/appsecadventure/p/role-the-catalyst">The Catalyst</a></strong> (e.g., any external expertise) <em>- optional</em></p></li></ol><p>Every role links to its own deep dive where we:</p><ul><li><p>define and assign the role</p></li><li><p>explore which domains they touch</p></li><li><p>clarify accountability</p></li><li><p>see which roles they interact with</p></li></ul><div class="pullquote"><p>I follow a developer-centric approach to AppSec because I believe in trust, freedom and collaboration. If you want to understand the background, you can dive in here:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/appsecadventure/p/background-why-secure-software-development&quot;,&quot;text&quot;:&quot;Explore the 6 AppSec Roles&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/appsecadventure/p/background-why-secure-software-development"><span>Explore the 6 AppSec Roles</span></a></p></div><h3>Can you just give me the bigger picture?</h3><p>We&#8217;ve got seven domains, each of which needs an owner and we&#8217;ve got six roles that could own something in theorie. In practice, only the five mandatory roles should take ownership. Externalization of accountability would create long-term dependency and we want to avoid that. </p><p>Here&#8217;s the AppSec Ownership Model at one glance:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hCY7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hCY7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hCY7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:252458,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.appsec-adventure.com/i/185715470?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hCY7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!hCY7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf04e259-e53d-4d0f-8db1-f576c51146ce_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">orange = domain owner || white = active supporter || gray = optional supporter</figcaption></figure></div><div class="pullquote"><p>What is your experience with AppSec ownership? Where does it align the model and where does it conflict? I would be happy to learn more about your experience!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.appsec-adventure.com/contact&quot;,&quot;text&quot;:&quot;Contact me&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.appsec-adventure.com/contact"><span>Contact me</span></a></p></div>]]></content:encoded></item></channel></rss>