Overview
Direct Answer
Runtime Application Self-Protection (RASP) is an in-process security technology that protects applications from attacks by monitoring and controlling application behaviour during execution. It detects malicious requests, unsafe method calls, and exploitation attempts in real time, then blocks or logs them without requiring external security infrastructure.
How It Works
RASP operates by instrumenting application code or integrating with runtime environments to observe method invocations, data flows, and user inputs. When suspicious patterns—such as SQL injection payloads, buffer overflow attempts, or unauthorised file access—are detected against configurable security rules, the engine halts execution or sanitises the request before it reaches vulnerable code paths.
Why It Matters
Organisations adopt RASP to reduce mean time to detection and response for zero-day and known vulnerabilities, particularly in legacy systems where patching is delayed. It provides visibility into actual attack traffic without network-level inspection, enabling faster incident response and stronger compliance postures for regulated industries.
Common Applications
RASP is deployed in web applications, microservices, and Java/.NET environments where organisations need protection during the software development lifecycle. Financial institutions, healthcare providers, and e-commerce platforms use it to defend applications against injection attacks, cross-site scripting, and insecure deserialisation.
Key Considerations
RASP introduces performance overhead due to inline monitoring and may generate false positives if security policies are misconfigured. Tuning is essential to balance protection efficacy with application responsiveness, and it does not replace code review or secure development practices.
Cross-References(1)
More in Cybersecurity
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Buffer Overflow
Offensive SecurityA programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.
AI Security
Offensive SecurityThe discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
Digital Forensics
Defensive SecurityThe process of collecting, preserving, and analysing electronic evidence for investigating security incidents.
Software Supply Chain Security
Security GovernancePractices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.
ISO 27001
Security GovernanceAn international standard for information security management systems specifying requirements for establishing and maintaining security.