Runtime application self-protection (RASP) tools provide continuous attack protection and detection by integrating with, or being built within, an application’s runtime environment. An application runtime environment encompasses everything needed for an application to function, including hardware, software, and the operating system.
These tools are commonly utilized in industries like financial services, healthcare, e-commerce, and government, where protecting sensitive data is critical. RASP solutions monitor and control the application's runtime execution to detect and block threats in real time, enhancing performance and behavior analysis.
Traditionally, static application security testing (SAST) software and dynamic application security testing (DAST) tools were the primary tools for identifying vulnerabilities in software. SAST software analyzes source code, while DAST tools test running applications. However, RASP tools provide real-time monitoring and protection, complementing SAST and DAST to create a more comprehensive approach to application security.
RASP software also differs from application shielding software as application shielding software proactively protects application code to prevent tampering but does not offer real-time attack monitoring and response. However, many application security products offer both sets of capabilities.
Developers use RASP tools to proactively identify vulnerabilities in production environments, while organizations can use them to prevent the exploitation of existing vulnerabilities in deployed applications. RASP solutions are often used alongside web application firewalls, intrusion detection and prevention systems (IDPS), and other application security measures to add a layer of self-protection.
To qualify for inclusion in the Runtime Application Self-Protection (RASP) category, a product must:
Control application runtime execution
Monitor application performance and behavior
Detect intrusions or abnormal behavior in real time
Block common attacks such as SQL injection, cross-site scripting and request forgery, denial of service (DoS), and session hijacking