https://www.sans.org/reading-room/whitepapers/analyst/protection-inside-application-security-methodologies-compared-35917