Customer Guest Blog – Driving down the Criticals – Clear Bank & Phoenix Security ASPM

ClearBank broke a 250-year tradition by becoming the first new clearing bank in the UK in centuries. That spirit of innovation made them an early design partner for Phoenix Security, shaping advanced strategies for Application Security Posture Management (ASPM) and remediation. Their commitment to modern cybersecurity practices stands out, especially given the landscape of shifting regulations and the constant need to tackle root causes behind vulnerabilities. Neil Reed, Principal AppSec Engineer at ClearBank, offers a glimpse into the mindset and methods that drive their approach.

====

The path to fewer critical risk ClearBank way

As a Principal Security Engineer, I have learned that there is never enough time or resources to address every vulnerability. This is where context and domain knowledge become crucial.

Numerous tools exist that can identify vulnerabilities in your codebase and outdated dependencies (Software Composition Analysis [SCA], Static Application Security Testing [SAST], etc.). Similarly, third-party scanning software can alert you to misconfigurations in your cloud infrastructure or non-compliance with best practices. Before you know it, you can find yourself overwhelmed by a sea of vulnerabilities, with a team unsure of which “Critical” issue is the top priority to address next. It’s all too easy to lose hope in this sea.

The problem lies in the fact that these tools lack context. They do not understand which codebases are your crown jewels. Is that code running on secure cloud infrastructure? What about the Web Application Firewall (WAF)? Does it offer any protection? And is there DDoS protection to help mitigate attacks? 

No one wants to be the person who cries wolf over a vulnerability that never materialises. However, it is essential to have the ability to raise concerns when justified. With the knowledge and context of countermeasures, what initially appeared as a critical issue can be downgraded accordingly.

I strongly believe in defense in depth: if one control fails, there should be another to detect, stop, and reduce the potential blast radius. For over a year, I have worked with Phoenix to map ClearBank’s systems, allowing for more informed business decisions regarding potential vulnerabilities.

As with most companies, mapping ownership and business importance is key. I am fortunate that ClearBank has a centrally managed list of repositories and team owners. Within this list are other useful metadata, such as the Domain and Subdomain of the service, along with a tier. The lower the tier, the higher the importance to the business. Using this information, I created a list of applications within Phoenix that group repositories.

ClearBank Phoenix security Deployment structure, ASPM, Vulnerability Managment
ClearBank and Phoenix security deployment Structure

To keep the cogs that make up the application close together, I used the Subdomain combined with the Domain to name the application. For example, a Domain of Payments and a Subdomain of Faster Payments would be called “Faster Payments – [Payments].” The reason for combining Domain and Subdomain is that Subdomains are not globally unique.

Within each application, Phoenix allows components to have unique overriding criticality score weighting. This is where I have assigned the tiering from the source of truth of repository ownership. Each element is a repository with its score and a tag linking it to the owning team. I use rules to assign ownership based on the team meta tag called “pteam”. This allows easy management and reassignment of ownership of repositories.

At this stage, I know which repositories (components) belong to which team, which elements make up an application (Subdomain and Domain), and their overall risk. The criticality setting based on tiering allows the original code scanning tool value to be weighted appropriately based on the importance of the service as deemed by the business.

At this stage, you could have a false sense of security that you know everything about your services. However, what about the cloud components where the service is deployed to? What if they are not secure?

Fortunately, Phoenix allows you to specify the environment and the service to which the application is deployed. As it’s the application and not the component, you must remember that code may perform one key function for a service, e.g., API, and other code performing the data lookups. If one of those components was compromised, what would be the effect on the service?

As with the components, applications can be assigned criticality weightings, allowing adjustment to the imported cloud findings. Each environment and service has its own score, considering what the purpose of the environment is. For example, your Dev Environment will not contain PII data, but Production will. Therefore, you should concentrate your efforts on securing production first.

At ClearBank, we use Infrastructure as Code [IaC] to deploy our infrastructure and meta tags to create the pipeline. Lookups are performed to create rules based on this data and assign cloud assets to services. The service names are combined for ease of pairing: Subdomain and Domain. Using the example from earlier, the “Faster Payments – [Payments]” application is deployed to the Production “Faster Payments – [Payments]” cloud service.

Now, we are starting to get to a system that knows the business importance of the code and the service it runs on. However, more can be done to help understand the countermeasures and score the vulnerabilities appropriately.

Again, Phoenix has thought of this and allows external, DMZ, or internal context settings. This applies to Cloud and Software; a default context can be set. In security, it pays to be paranoid until you are sure something is true; therefore, I have everything set to the worst-case external scenario by default. I class anything directly exposed to the Internet as external; if it’s behind a WAF or other service but consumes data from a user, it’s DMZ; then private, only verified with no direct Internet ingress, are internal. The assignment is achieved by adding tags to the cloud assets and rules within the context engine.

ClearBank Phoenix security Deployment structure, ASPM, Vulnerability Managment
Clear Bank Aggregation and Correlation with Phoenix Security

This information and configuration are fantastic at helping assign the appropriate scoring to the service. There will always be domain knowledge that someone holds in their head or is undocumented. This is where other specific rules become very useful. The exception engine allows for this.

A prime example is that unit tests will exist within code repositories but are not run on Production. They, therefore, shouldn’t be given the same importance as a Production vulnerability. To tackle this, I have created a Test project rule that looks at the location of the finding for keywords that relate to test projects, such as “xUnit,” “smoke,” and “Test.” If a match is found, the finding is risk-recast to a lower score. It is still there for overall knowledge and reporting but allows the more significant issues to be tackled first.

Other elements we used for Scaling Security – Exceptions, Smarter Remediation, and Cutting Container Noise

ClearBank Phoenix security Deployment structure, ASPM, Vulnerability Managment
ClearBank Container Version throttling with Phoenix Security

Security is never just about finding vulnerabilities—it’s about fixing them where they matter most. Leveraging Phoenix Security transforms how we approach prioritization and remediation at ClearBank.

The ability to write security exceptions and rescore vulnerabilities at scale has been a game-changer. Not every alert deserves the same attention, and without a way to fine-tune risk, teams can get overwhelmed by the workload. The exception engine in Phoenix Security allows us to craft rules that adjust severity dynamically, ensuring that real threats stay at the forefront. In contrast, the less critical ones don’t clog up the workflow. Test artifacts? They don’t get the exact weighting as Production issues. Vulnerabilities buried in deprecated code that never reaches Production? They don’t get in the way of fixing actual risks.

But security isn’t just about managing exceptions—it’s about fixing problems at scale. That’s why we’ve been running targeted remediation campaigns, ensuring engineers focus their time on vulnerabilities that truly affect the business. Instead of a never-ending list of issues, we can create structured, achievable remediation sprints aligned with how teams work, not against them.

A graph showing different colors

AI-generated content may be incorrect.
Container Risk reduction to 91% of critical after activating container throttling

One of the biggest wins? Tackling the sheer volume of container vulnerabilities. Initially, we were flooded with container-related security findings from Azure. Managing that number was impractical, and we were clearly dealing with excessive noise. Using Phoenix Security’s container throttling capabilities, we stripped away the unnecessary imports, refining our dataset to focus on relevant containers. The result? A streamlined, high-fidelity view, a 91% reduction in noise. Suddenly, security findings became actionable, not overwhelming.

This transformation is not merely about streamlining processes; it’s about enhancing security’s effectiveness. We’ve crafted a workflow that scales efficiently without causing delays by removing distractions and providing teams with clear guidance. It’s a security approach that collaborates seamlessly with engineering, rather than hindering it.

Conclusion

Using these combined techniques allows for the overall number of vulnerabilities to increase but the number of Criticals to be driven down to more manageable amounts.

In times when security resources are never enough, and the engineering team needs to focus on producing code rather than chasing every vulnerability, we rely on a partner like Phoenix Security to help us scale our resources and provide clarity over who needs to do what where.

Note from Phoenix Security

We are absolutely grateful and static to work with amazing partners like ClearBank and the ability to move the industry forward in a more risk based and controlled threat centric approach.

Francesco CEO & Co-Founder Phoenix Security

Get on top of your code and container vulnerabilities with Phoenix Security Actionable ASPM powered by AI-based Reachability Analysis

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis. This innovative approach correlates runtime data with code analysis to deliver a single, prioritized list of vulnerabilities. This list is tailored to the specific needs of engineering teams and aligns with executive goals, reducing noise and focusing efforts on the most critical issues.

Why do people talk about Phoenix?

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

• Contextual Deduplication with reachability analysis: Utilizing canary token-based traceability for network reachability and static and dynamic runtime reachability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerabilities’ exploitability, combining runtime threat intelligence with application security data for precise risk mitigation.

ASPm, CISA KEV, Remote Code Execution, Inforamtion Leak, Category, Impact, MITRE&ATTACK, AI Assessment, Phoenix CISA KEV, Threat intelligence

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get a demo with your data, test Reachability Analysis and ASPM

Neil brings over two decades of IT experience across DevAppSec, SRE, and software engineering roles in diverse sectors. He leverages his software engineering background to craft in-house tools that streamline security tasks, empower teams to detect misconfigurations, and automate remediation workflows. By collaborating closely with cross-functional teams, Neil identifies vulnerabilities in applications and offers clear, actionable guidance on addressing them. His meticulous approach and extensive application security expertise help organizations build secure, resilient systems that meet rigorous standards. Neil fosters a judgment-free, collaborative learning environment, encouraging open dialogue and continuous improvement. Ultimately, he aims to strengthen security practices, empower teams to deliver robust applications, and cultivate a culture of security that keeps pace with evolving cyber threats.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The cybersecurity world is reeling as MITRE’s funding for the CVE and NVD systems expires, disrupting the backbone of global vulnerability management. As traditional sources like the National Vulnerability Database collapse under funding cuts and submission backlogs, security teams face delays, incomplete data, and loss of automation in remediation pipelines. This isn’t just a data problem—it’s a structural crisis for application security and vulnerability correlation. In this landscape of uncertainty, Phoenix Security’s ASPM platform steps up with a code-to-cloud correlation engine that doesn’t depend on outdated data workflows. By connecting code-level insights (including tools like Semgrep) to runtime and cloud environments, Phoenix enables faster, context-aware vulnerability remediation—even as NVD and CVE pipelines deteriorate. This article dives into the implications of the CVE shutdown and how Phoenix Security is helping security and development teams transition to a resilient, correlation-first approach to cybersecurity.
Francesco Cipollone
Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
The recent Google acquisition of Wiz for $32 billion has sent shockwaves through the cybersecurity industry, particularly in the realm of Application Security Posture Management (ASPM). This monumental deal highlights the critical importance of cloud security and the growing demand for robust ASPM solutions. While the acquisition promises potential benefits for Google Cloud users, it also raises concerns about vendor lock-in and the future of cloud-agnostic security. Explore the implications of this acquisition and discover how neutral ASPM solutions like Phoenix Security can bridge the gap in multi-cloud environments, ensuring continuous, collaborative, and comprehensive security from code to cloud.” – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO