Tuesday, October 3, 2017

Secure Software development Life Cycle


The software development life cycle, or SDLC, encompasses all of the steps that an organization follows when it develops software tools or applications. Organizations that incorporate security in the SDLC benefit from products and applications that are secure by design. Those that fail to involve information security in the life cycle pay the price in the form of costly and disruptive events.
In an organization that's been around for several years or more, the SDLC is well-documented and usually includes the steps that are followed and in what order, the business functions and/or individuals responsible for carrying out the steps and information about where records are kept.

A typical SDLC model contains the following main functions:


Conceptual definition. This is a basic description of the new product or program being developed, so that anyone reading it can understand the proposed project.
Functional requirements and specifications. This is a list of requirements and specifications from a business function perspective.
Technical requirements and specifications. This is a detailed description of technical requirements and specifications in technical terms.
Design. This is where the formal detailed design of the product or program is developed.
Coding. The actual development of software.
Test. This is the formal testing phase.
Implementation. This is where the software or product is installed in production.
Each major function consists of several tasks, perhaps documented in flowchart notation with inputs, outputs, reports, decisions and approvals. Some companies build workflow applications to support all of this.

Getting the right security information to the right people

Many people in the entire development process need all kinds of information, including security information, in a form that is useful to them. Here is the type of information that is required during each phase of the SDLC.

Conceptual -- Organization information security principles and strategies
Functional requirements and specifications -- Information security requirements
Technical requirements and specifications -- Information security requirements
Design -- Enterprise security architecture and security product standards
Coding -- Development standards, practices, libraries and coding examples
Testing -- Test plans that show how to verify each security requirement
Implementation -- Procedures for integrating existing authentication, access controls, encryption, backup, etc.

If you are wondering why maintenance is omitted from the life cycle example here, it is because maintenance is just an iteration of the life cycle: when a change is needed, the entire process starts all over again. All of the validations that are present the first time through the life cycle are needed every time thereafter.

Finally, one may say that these changes represent a lot of extra work in a development project. This is not the case – these additions do not present that much extra time. These are but small additions that reap large benefits later on.

Fix it now or pay the price later


Organizations that fail to involve information security in the life cycle will pay the price in the form of costly and disruptive events. Many bad things can happen to information systems that lack the required security interfaces and characteristics. Some examples include:

Orphan user accounts (still-active accounts that belong to employees or contractors who have left the organization) that exist because the information system does not integrate with an organization's identity management or single sign-on solution.
Defaced Web sites as a result of systems that were not built to security standards and, therefore, include easily exploited weaknesses.
Fraudulent transactions that occur because an application lacked adequate audit trails and/or the processes required to ensure they are examined and issues dealt with.
You should figure that problems like these are all costly to solve – in most cases far more costly than the little bit of extra effort required to build the products or applications correctly in the first place.

2 comments:

  1. This blog share detailed information on secure software development. This is very useful content for all developers. Thanks for sharing

    ReplyDelete
  2. Because of this , it truly is superior you can applicable research prior to providing. It will be possible to share larger document that way. Website Design

    ReplyDelete

Cross Site Request Forgery Protection with Double Submit Cookies Patterns

When a user authenticates to a site, the site should generate a (cryptographically strong) pseudo-random value and set it as a cookie on the...