03/05/2026

ASPM Is Not Magic. It Is a Bandage. A Useful One

// ELUSIVE THOUGHTS — APPSEC / TOOLING

ASPM Is Not Magic. It Is a Bandage. A Useful One.

Posted by Jerry — May 2026

Every AppSec vendor pitch deck in 2026 contains the acronym ASPM. Application Security Posture Management. The category is real. The marketing is louder than the substance.

This post is the practitioner's view of what ASPM actually does, what it does not do, and how to evaluate whether your organization is ready to spend on it. Written from the perspective of someone who runs assessments for clients and has watched several ASPM rollouts succeed and several fail.

// what aspm is, mechanically

An ASPM platform sits on top of your existing security scanners and aggregates their findings. SAST results, DAST results, SCA dependencies, secrets scanners, container image scanners, IaC scanners. The platform deduplicates, correlates, prioritizes, and routes findings to owners.

The market is crowded. Apiiro, Cycode, Backslash, OX Security, Snyk AppRisk, Endor Labs, Aikido, Dazz, Legit Security, ArmorCode, Phoenix Security. The differentiation between vendors is meaningful but smaller than the marketing suggests. The core capability — aggregation, correlation, prioritization — is shared across the category.

// what aspm actually does well

CAPABILITY 1 — DEDUPLICATION

Four scanners reporting the same SQL injection in the same line of code as four findings is a real problem in mature security programs. ASPM platforms collapse this to a single finding with multiple sources. The reduction in alert fatigue is significant and measurable. If your team is drowning in duplicate findings, this alone justifies ASPM.

CAPABILITY 2 — REACHABILITY ANALYSIS

A vulnerable function in an imported library is only exploitable if your code actually calls it. ASPM platforms with reachability analysis can downgrade findings in unreachable code paths, frequently reducing the open finding count by 60-80 percent. This is the most concrete value-add of the category. The reachability analysis quality varies meaningfully between vendors.

CAPABILITY 3 — OWNERSHIP MAPPING

Findings get routed to the team that owns the code, via Git blame, CODEOWNERS, and integration with the engineering org chart. The "who fixes this?" question is answered automatically. This is more valuable than it sounds in any organization with more than three engineering teams.

CAPABILITY 4 — RISK SCORING THAT INCLUDES BUSINESS CONTEXT

Generic CVSS scores treat every vulnerability the same regardless of where it lives. ASPM platforms can incorporate context: is this service internet-facing, does it handle PII, is it in production, is the vulnerable code path actually invoked? The result is a risk score that reflects the organization's actual exposure, not just the theoretical severity.

CAPABILITY 5 — TREND REPORTING TO LEADERSHIP

If you have ever tried to produce a quarterly board report on AppSec posture by manually pulling from five scanners and reconciling the numbers, you understand why this matters. ASPM platforms produce reports that can be defended in a board meeting. The strategic value of having a single number to talk about — even an imperfect one — is real.

// what aspm does not do

The honest list, which vendors will not put on their slides:

  1. It does not find vulnerabilities your existing scanners did not already find. Aggregation is not detection. The underlying scanner quality is what determines what gets identified. ASPM organizes the output, it does not produce new output.
  2. It does not replace threat modeling. Threat modeling is a forward-looking design exercise. ASPM is a backward-looking finding aggregator. Different work, different time, different output.
  3. It does not fix anything automatically. Auto-remediation features exist but are limited to specific cases — package upgrades, simple config changes. The hard fixes still require engineers writing code.
  4. It does not solve organizational dysfunction. If your AppSec team and your engineering teams have a poor working relationship, an ASPM platform makes the problems more visible without resolving them.
  5. It does not eliminate the need for security expertise on the team. Someone has to interpret the findings, calibrate the prioritization, configure the integrations, and respond to the alerts.

// the readiness test

Before signing a six-figure ASPM contract, run this test on your existing security program:

Pull a week of findings from every scanner you currently run. Put them in a spreadsheet. Manually deduplicate them. Manually assign owners. Manually prioritize.

If the result is unmanageable chaos, ASPM will help significantly. The platform will do this work continuously and at scale.

If the result is tractable — annoying but doable in a day — your problem is not tooling. Your problem is more likely to be one of the following: scanner configuration that is producing too many false positives, lack of clear ownership, lack of remediation SLA enforcement, or a backlog that has not been triaged in months. ASPM will not solve these. They are organizational problems disguised as tooling problems.

// the implementation pattern that works

Successful ASPM rollouts share a few characteristics from the engagements I have seen:

The implementation is owned by a senior AppSec engineer with explicit allocation, not a side project. The engineer becomes the operator of the platform — tuning the rules, calibrating the scoring, training the engineering teams on how to interpret the output.

The rollout is phased. Start with one set of scanners and one engineering team. Demonstrate value. Expand. Trying to integrate every scanner and every team in a quarter is how ASPM rollouts become shelfware.

The integration with engineering workflow is taken seriously. The findings need to land in the engineer's existing tools — Jira, Linear, GitHub Issues — with clear context, clear severity, and clear remediation guidance. Findings that require engineers to log into yet another portal are findings that do not get fixed.

The metrics are tracked from baseline. Mean time to remediation. Open finding count by severity. Trend over time. These metrics are what justifies the platform spend at renewal time.

// the bottom line

ASPM is a real category that solves a real problem. It is also being marketed as a transformative platform, which it is not. It is a useful aggregation and prioritization layer that reduces operational toil and produces better metrics.

If your AppSec program is mature enough that the volume of findings is the bottleneck, ASPM helps. If your AppSec program is still building scanner coverage, building threat modeling practice, or building remediation discipline, ASPM is premature optimization. Spend the budget on the underlying work first.

Tools do not fix process gaps. They expose them faster. Whether that exposure becomes useful depends on whether the organization is ready to act on it.

$ end_of_post.sh — running ASPM at your shop? what's working, what isn't?

CVE-2025-59536: When Your Coding Agent Becomes the Backdoor

// ELUSIVE THOUGHTS — APPSEC / AI AGENTS CVE-2025-59536: When Your Coding Agent Becomes the Backdoor Posted by Jerry — May 2026 On F...