# Part 6 - Application ## Abstract **Application Hardening**: Best practices to apply to the build and release of user space applications, in order to reduce the number of attack surfaces used by potential attackers. The term of Application (App) has a very wide definition in **AGL**. Almost anything which is not in the core Operating System (OS) is an Application. Applications can be included in the base software package (image) or can be added at run-time. -------------------------------------------------------------------------------- ## Acronyms and Abbreviations The following table lists the terms utilized within this part of the document. Acronyms or Abbreviations | Description ------------------------- | ---------------------------------------------------- _3GPP_ | **3**rd **G**eneration **P**artnership **P**roject _CASB_ | **C**loud **A**ccess **S**ecurity **B**roker _DAST_ | **D**ynamic **A**pplication **S**ecurity **T**esting _DPI_ | **D**eep **P**acket **I**nspection _IDS_ | **I**ntrusion **D**etection **S**ystems _IPS_ | **I**ntrusion **P**revention **S**ystems _IPSec_ | **I**nternet **P**rotocol **Sec**urity _LSM_ | **L**inux **S**ecurity **M**odule _MITM_ | **M**an **I**n **T**he **M**iddle _OSI_ | **O**pen **S**ystems **I**nterconnection _SATS_ | **S**tatic **A**pplication **S**ecurity **T**esting