This article discusses the ways to implement security assurance, the importance of security investment decision dashboard, the categories based on which securities are assessed, the benefits of creating an application security practice, and the steps for application inventory. It also covers the relationship between business case and risk management framework, the major phases associated with security investment decision dashboard, and the reasons behind the vulnerability of applications.