Guidelines for Software Acceptance Flashcards

1
Q

Software acceptance is

A

the life cycle process of officially or formally accepting new or modified software components, which when integrated form the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptance criteria must be predefined with respect to the following categories:

A

Functionality, Performance, Quality, Safety, Privacy, and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Objectives of software acceptance include

A

Verification that the software meets specified functional and assurance requirements; Verification that the software is operationally complete and secure
as expected; Obtaining the approvals from the system owner; Transference of responsibility from the development team or company (vendor) to the system owner, support staff, and operations personnel if the software is deployed internally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software accepted for deployment or release

must

A

be secure by design, default and deployment; complement existing defense in depth protection; run with least privilege; be irreversible and tamper-proof; isolate and protect administrative functionality and security management interfaces; and have non-technical protection mechanisms in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SD3

A

secure by design, default and deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EULA

A

End User Licensing Agreements - You shall not modify, translate, reverse engineer, decompile or disassemble
the Software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DMCA

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reverse engineering protection is increased by

A

code obfuscation and anti-tampering techniques, which must be verified in the software before being accepted for release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Benefits of Accepting Software Formally

A

Final checkpoint to discover the existence of missed and unforeseen security vulnerabilities and to validate the presence of security controls that will address
known threats; ensure that the software publisher or acquirer are protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some of the major items to consider before accepting software that is built in-house for deployment/release are

A

Completion Criteria; Change Management; Approval to Deploy / Release; Risk Acceptance and Exception Policy; Documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security related milestones include, but are not limited to the following:

A

Generation of the of the requirements traceability matrix; completion of the threat model during the design phase; review and sign-off on the security architecture at the end of the design phase; review of code for security vulnerabilities after the development
phases; completion of security testing at the end of the application testing phase; and completion of documentation before the deployment phase
commences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As part of the software acceptance process, the following must be verified as part of change management:

A

change requests are evaluated for impact on the overall security of the software; the asset management database is updated with the new/updated software information; and the change is requested formally, and evaluated and approved by appropriate signatory authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk must be accepted by whom

A

The business owner and not by officials in the IT department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAID

A

Risk, Actions, Issues and Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk transference can be achieved by

A

Transferring the risk to someone else, e.g., an insurance company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk avoidance can be achieved by

A

Discontinuing the use of the software.

17
Q

When you cannot mitigate, transfer or avoid the risk,

the best option is to accept the risk with

A

A documented exception to policy; it must be allowed, if and only if there exists contingency plans with explicit dates specified to address the risk.

18
Q

Some of the primary objectives for documentation are

A

To make the software deployment process easy and repeatable, and to ensure that operations are not disrupted and the impact upon changes to the software is understood.

19
Q

Documents that need to be verified as complete for Software Acceptance

A

RTM; Threat Model; Risk Acceptance Document; Exception Policy Document; Change Requests; Approvals; BCP or DRP; Incident Response Plan (IRP); Installation Guide; User Training Guide/Manual.

20
Q

BCP

A

Business Continuity Plan (BCP)

21
Q

DRP

A

Disaster Recovery Plan (DRP)

22
Q

The major objective of the software V&V process is

A

To ensure that the software is reliable and that no unintended behavior is observed or can be forced.

23
Q

Verification and Validation activities

A

Reviews (Design and Code) and Testing (Error detection, Acceptance, Independent Third Party).

24
Q

The formal review process includes

A

The presentation of the materials to a review panel or board for approval before proceeding to the next phase of the life cycle.

25
Q

Fagan inspection process

A

It is a highly structured process with several steps that are to be followed to determine defects in development results, such as specifications, design and code.

26
Q

Error detection tests include

A

Unit and component level testing.

27
Q

In addition to validation tests to ensure that the software satisfies the specified requirements, verification testing must be performed to ascertain the following at a minimum:

A

Proper handling of input validation using fuzzing, proper output responses and filtration, proper error handling mechanisms, secure state transitions and management, proper handling of load and tests, resilience of interfaces, temporal (race conditions) assurance checks, spatial (locality of reference) assurance and memory management checks, and
secure software recovery upon failures.

28
Q

Acceptance tests are used to

A

Demonstrate if the software is ready for its intended use or not.

29
Q

The impact upon integration of the different software components for the system can be determined by

A

Regression and/or simulation testing.

30
Q

Regression testing is performed to

A

Ensure that the software is backward compatible and that the software does not introduce any new risks to the computing environment.

31
Q

Independent third party testing of software functionality and assurance is the process in which

A

The software is reviewed, verified and validated by someone other than the developer of the software.

32
Q

Certification

A

A set of procedures that assess the suitability of software to operate in a computing environment, by evaluating both the technical and non-technical controls based on predefined criteria(e.g., Common Criteria).

33
Q

At the minimum, security certification will include assurance evaluation of the following:

A

User rights, privileges and profile management; Sensitivity of data and application and appropriate controls; Configurations of system, facility and locations; Interconnectivity and dependencies, and
Operational security mode.

34
Q

Accreditation is

A

management’s formal acceptance of the system after an understanding of the risks to that system rating in the computing environment.

35
Q

Software must not be accepted as ready for release unless

A

it is certified and accredited.

36
Q

To meet the goals of software assurance, when accepting software, the acquisition phase MUST include processes to [Q2]

A

assess the presence and effectiveness of protection mechanisms.

37
Q

The process of evaluating software to determine whether the products of a given development phase satisfies the conditions imposed at the start of the phase is referred to as

A

Verification

38
Q

When there are known vulnerabilities in legacy software and there is not much you can do to mitigate the vulnerabilities, it is recommended that [Q8]

A

the business accepts the risk with a documented exception to the security policy.

39
Q

The exception to policy process must ensure

A

There is a contingency plan in place to address the risk by either replacing the software with a new version or discontinuing its use (risk avoidance).