CH9 SSDLC Flashcards

In this chapter, we will discuss how to integrate security into a software development lifecycle. This is known as Secure Soft- ware Development Lifecycle or Security Development Lifecycle. In the following, we will use the term Secure Software Develop- ment Lifecycle (SDLC), as we think that any software develop- ment lifecycle should have security integrated.

1
Q

Software is hard to get right
Lines of code per updating linux kernel version is increasing
Increase in:

A

Code size
Code complexity
Number of products
Product versions
Used technologies (languages, frameworks, libs)
Usually software companies avoid deleting code, for backwards compatibility. They instead add new patches to the code, for stability all while ensuring this compatibility
Javascript has many trivial bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All software has bugs

A

By transivity, all software has some vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAP’s two-staged security expert model

A
  • central security team, defines the security global processes such as the SAP Secure Development Lifecycle (SSDLC)
  • local security champions in each development area or team supporting the devs, architects and product owners implementing said SSDLC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Main Steps in SAP SDLC

A

Preparation
Training
Development
Security Testing
Transition
Utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preparation SAP SDLC

A

Identifying application specific risks, third party components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Development

A

Security Measures Plan describing all planned activity to mitigate security risks identified in preparation

Security testing execution with documented results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transition

A

Security Validation acting like the first customer executing a security analysis and security test of the product

contains
architectural analysis
code reviews
penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Utilization

A

Security response team handles communication with customers and external researchers with respect to reported vulnerabilities

covers own code and 3rd party components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Development LifeCycle adapted for cloud and agile software development approaches

A

Cyclic progression of:
Risk identification
Plan Security Measures
BUILD
Secure Development
Security Testing
Security Validation
RELEASE
Security Response

Tackles in sprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly