An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Application Security Testing, or AST, is testing, analyzing, and reporting the security level of an application as it moves from early development stages through deployment and maintenance.
An effective AST program incorporates products, services, and solutions that continuously assess and address application vulnerabilities through the entire software development life cycle. An AST program should:
Reduce the number of vulnerabilities in released applications.
Mitigate the potential impact of the exploitation of undetected or unevaluated vulnerabilities.
Identify and address the root causes of vulnerabilities to prevent future recurrences.
Provide greater insight into the agency’s application security posture.
Successful AST programs go beyond automation — agencies also need to hire cybersecurity experts to manually analyze how government applications work and how they can be exploited. Each agency may have a different approach to their AST program, and GSA’s contract options offer a variety of sophisticated tools that statically and dynamically analyze applications for detectable weaknesses.
Buy AST solutions
Agencies can buy AST products and services through our technology contracts and purchasing programs:
Our Application Security Testing buyer’s guide provides key considerations when implementing an AST program. It also helps agencies identify and procure AST offerings to improve their application security posture.
To make your acquisition experience easier and more efficient, our AST Statement of Work template [PDF]provides typical language for a cybersecurity solicitation and examples of specific activities and deliverables associated with AST services.
Resources
“Improving the Nation’s Cybersecurity” directs Federal agencies to advance security measures that drastically reduce the risk of successful cyber attacks against the Federal government’s digital infrastructure.
“Moving the U.S. Government Toward Zero Trust Cybersecurity Principles [PDF]” — Office of Management and Budget Memo M-22-09 provides agencies further guidance to improve their application security. Specifically, it charges agencies to operate dedicated AST programs and utilize high-quality firms specializing in application security for independent third-party evaluation.
“Recommendations for Mitigating the Risk of Software Vulnerabilities”> — National Institute of Standards and Technology Special Publication 800-218 provides a core set of high-level secure software development practices that can be integrated into each SDLC implementation.
“Technical Guide to Information Security Testing and Assessment — NIST Special Publication 800-115 assists organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies.
“Develop and Publish a Vulnerability Disclosure Policy” — Cybersecurity and Infrastructure Security Agency Binding Operational Directive 20-01 directs agencies to publish the status of vulnerabilities listed in a Vulnerability Disclosure Policy. CISA BOD 22-01, “Reducing the Significant Risk of Known Exploited Vulnerabilities” requires agencies to identify and address known exploited vulnerabilities within a defined timeframe.
Contact us
Chat or call
We are available Sunday 9 p.m.-Friday 9:30 p.m. Eastern time. Average wait times are under a minute.
Live chat currently closed: Normal hours are Sunday 9 p.m.-Friday 9:30 p.m. Eastern time.
Traveler reimbursement is based on the location of the work activities and not the accommodations,
unless lodging is not available at the work activity, then the agency may authorize the rate where
lodging is obtained.
Unless otherwise specified, the per diem locality is defined as "all locations within, or entirely
surrounded by, the corporate limits of the key city, including independent entities located within
those boundaries."
Per diem localities with county definitions shall include"all locations within, or entirely
surrounded by, the corporate limits of the key city as well as the boundaries of the listed counties,
including independent entities located within the boundaries of the key city and the listed counties
(unless otherwise listed separately)."
When a military installation or Government - related facility(whether or not specifically named) is
located partially within more than one city or county boundary, the applicable per diem rate for the
entire installation or facility is the higher of the rates which apply to the cities and / or counties,
even though part(s) of such activities may be located outside the defined per diem locality.