2.3 Summarize secure application development, deployment, and automation conpcepts. Flashcards
This must be configured and segmented to properly implement staging. This often requires at least four main network divisions: development, test, staging, and production.
Secure IT environment.
Where new software code is being crafted by on-staff programmers and developers. For some organizations, this might also be where custom-built hardware is being created.
Development (Environment)
An essential part to the security requirements of every modern organization. A key element of a software development program is this and code review.
Test (Environment)
Where new equipment or code, whether developed in-house or obtained from external vendors, is configured to be in compliance with the company’s security policy and configuration baseline. Once a system or software goes through this process, it can be moved to the test network for evaluation. After the system has passed evaluation, it can be deployed into the production network.
Staging (Environment)
The network where the everyday business tasks and work processes are accomplished. It is also known as the operations network. It should only be operating on equipment and systems that have been properly staged and tested.
Production (Environment)
An evaluation process employed by many organizations to ensure that newly integrated hardware and software do not reduce performance or efficiency nor introduce any unexpected security issues.
Quality Assurance (Environment)
A new IT movement in which many elements and functions of IT management are being integrated into a single automated solution. It typically consists of IT development, operations, security, and quality assurance.
Secure DevOps
Used to ensure that sufficient resources are available to support and maintain a system, software, or solution. Also known as preallocation.
Provisioning
Can focus on streamlining and fine-tuning resource allocation to existing systems for a more efficient distribution of resources.
Deprovisioning
Accomplished through the cryptographic concept of hashing.
Integrity measurement
Those efforts designed to implement security into software as it’s being developed.
Secure coding concepts/ techniques
A database programming and management technique used to reduce redundancy.
Normalization (secure coding)
A subroutine or software module that can be called upon or accessed by applications interacting with an RDBMS.
Stored procedures (secure coding)
The coding practice of crafting code specifically to be difficult for other programmers to decipher.
Obfuscation/ camouflage (secure coding)
The inclusion of preexisting code in a new program. It can be a way to quicken the development process.
Code reuse (secure coding)