There is no such thing as a non-critical app when it comes to security

F5 Ecosystem | April 09, 2018

At the Battle of Thermopylae, so the story goes, Leonidas and his band of three-hundred Spartans were defeated not because of the expected frontal assault. No, it was because the Persians snuck around and out-flanked them thanks to a narrow goat path that gave them a foothold behind Spartan the line defending the Hot Gates*.

It was a strategic error, perhaps, to not protect the less obvious attack route of a goat path. Hindsight is 20/20 and with it we can now see that failing to guard every potential entry point can prove devastating.

So have we learned from history, or are we doomed to repeat it?

Based on the results of our State of Application Delivery 2018 survey, we’re trying our best to repeat it.

What this chart shows is that 2% of organizations are using a WAF to protect … nothing. None of their applications are protected by the technology. Conversely, 13% of organizations are protecting all of their apps (100%) with a WAF.

Somewhere in between lie the bulk of organizations, with 34% protecting a quarter or less (1-24%) of their applications. Those apps are likely akin to the Hot Gates. They are the most visible, the ones you promote and advertise. They’re the ones that see the most traffic and are, logically, the most likely route of attack.

The rest are goat paths. Narrow, overgrown trails into the data center that are rarely used and least likely to come under attack. Or so you hope.

As an industry we tend to talk in terms of “critical” applications. These are the apps that business needs to operate every minute of every day. That’s your CRM, your SFA, your online store, the APIs your partners use to send you business. These are the ones we talk about with reverence. You need to protect them from attack, scale them to meet demand, and improve their performance so even the most demanding of consumers will be delighted by your attention to the user experience.

We tend to ignore the ‘non-critical’ applications. Sometimes we even shove them off in a public cloud somewhere without regard for setting up the security checkpoints they need to keep data and credentials safe.

Today I’m saying that like that goat path that turned out to be such a critical entry point into the Spartans defenses, so are all those ‘other’ applications. If they connect to the Internet – and by virtue of connecting to network, they probably do – they are a potential entry point for attackers. If they take advantage of the same platforms and protocols as your ‘critical’ apps – and they probably do – then they are a risk to every application because they share the same vulnerabilities.

All it takes is one, narrow path into the network through any application to put the entire organization (the business) at risk. Gaining a foothold on one application or server opens up a wealth of avenues for attackers to explore. From credentials to connections, a single point of attack inside the data center (whether public cloud or on-premises) is a greater threat than we like to consider.

There is no reason to ignore ‘non-critical’ applications when it comes to security, and in fact there are a hundreds, perhaps thousands, of good reasons to pay attention to them and provide the protection afforded by a WAF. Employee credentials. Personal data. Routes to other, juicier applications and services.

There is no such thing as a non-critical app when it comes to security.

Don’t ignore the goat paths in favor of the Hot Gates.


*Yes, the Persians likely would have won anyway, but now we’ll never know, will we?

Share

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us