Secure Software Development Training 4

About This Presentation
Title:

Secure Software Development Training 4

Description:

Securium Fox Technology Provide Cyber Security Service In USA, India, Bangalore, UK, London, China, Africa, Japan As Well As Provide Ethical Hacking, Penetration Testing, Training Moreover Securium Fox Technology Provide All Platform Certification Such As CISCO , Microsoft, EC-Council, ISC2, Rad Hat And So On. You Get Any Certification With 100% Exam Crack Result. CISCO All Certification – CCNA, CCNP, CENT and so on. EC-Council All Certification – CEHv10, CHFI, LPT, ECSA and so on. ISC2 All Certification – CISM. CISSP and so on. Microsoft All Certification – MCSA, MCITP and so on. – PowerPoint PPT presentation

Number of Views:10

less

Transcript and Presenter's Notes

Title: Secure Software Development Training 4


1
SECURIUM FOX offers cyber security consultancy
services with its expert and experienced team. We
are providing consulting services to prevent
cyber attacks, data leak and to ensure that our
customers are ready and safe against cyber
attacks, with more than 15 years of
experience.In addition to pentests and
consulting services, SECURIUM FOX prepares its
customers and field enthusiasts for real life
scenarios by providing trainings in the lab
environment which was prepared by themselves,
with its young, dynamic and constantly following
team.Everytime that hackers are in our lives,
there are always risks that we can face with a
cyber attack. Over the years cyber security has
become a critical precaution for all
organizations and companies after the effects and
number of attacks. SECURIUM FOX tests the weak
points of customers for possible attacks and
provides consulting services to eliminate these
weak points.SECURIUM FOX team also offers
support for the development of our country in
this field by supporting free events being
organized as a volunteer by the Octosec team.
ABOUT US
2
  • SECURE SOFTWARE DEVELOPMENT TRAINING

3
Secure SDLC best practices
  • While focus on technicalities is a given during
    the SDLC, this tip explains how to secure the
    SDLC, from the analysis phase right through to
    deployment.
  • The traditional software development life cycle
    (SDLC) is geared towards meeting requirements in
    terms of functions and features, usually to
    fulfill some specified business objective.
    However, the set of activities during the
    different phases of the SDLC might not always
    intrinsically measure up to security standards.
  • This can be addressed by incorporating a security
    layer within the SDLC, embedding security right
    from the beginning of the development cycle. The
    idea is to have security built in rather than
    bolted on, maintaining the security paradigm
    during every phase, to ensure a secure SDLC.

4
Phase 1 Requirements gathering and analysis
  • The software development process typically starts
    with requirements gathering and systems analysis,
    the results of which are then used to create the
    design. The business analysts and other personnel
    putting together requirements and functional
    specificatio

5
  • During requirements gathering for a secure SDLC,
    the first step is to identify applicable policies
    and standards and the mandates that the software
    will need to follow compliance is an important
    factor to incorporate a standard framework, as
    well as to ensure audit requirements are met.
    Next, the compliance requirements can be mapped
    to the security controls.
  • This is followed up by developing a
    confidentiality, integrity and availability (CIA)
    matrix that helps define the foundation of
    security controls, and is instrumental in
    creating a secure software design. At this point
    security toll gates are set, which are
    essentially criteria that need to be met for the
    project to move on to the coding phase.

6
  • Phase 2 Design
  • An architectural blueprint is now created, taking
    all the security requirements into consideration.
    This defines the entry and exit points in
    addition to defining how the business logic would
    interact with the different layers of the
    software.
  • In keeping with the secure SDLC paradigm, threat
    modeling is performed, which puts the software
    through various scenarios of misuse to assess the
    security robustness. In the process, various
    avenues to tackle potential problems emerge. One
    must keep in mind that the application
    communicates in a distributed environment rather
    than just a single system.

7
  • Phase 3 Coding
  • The best practices in the coding phase of a
    secure SDLC revolve around educating the
    developers. Instead of focusing only on language-
    or platform-specific problems, developers need an
    insight into how security vulnerabilities are
    created. These include not just technical
    vulnerabilities, but also problems from a
    business logic perspective.
  • It is necessary to establish secure coding
    practices among developers through guidelines and
    awareness campaigns. A source code review helps
    in making sure the coding quality is maintained,
    in addition to meeting secure coding standards.
    Organizations can also procure automatic code
    review tools to ensure security.

8
  • Phase 4 Quality assurance
  • The three pillars of quality are performance,
    functionality and security. Without embedded
    security, the quality of the software is
    questionable, thus making security a de facto
    quality vector. Tools to measure technical
    vulnerabilities are all very well, but the human
    factor cannot be underestimated, especially when
    it comes to business logic.
  • For a secure SDLC, outsourcing of software
    testing is a good idea, for cost savings
    definitely, but more so to leverage the
    specialized testing knowledge, skills and
    experience of the experts in the company being
    outsourced to.
  • When outsourcing, legalities like data
    sensitivity must be considered, and access to
    production databases should be avoided. Data
    should be masked or sanitized and the scope of
    the testing pre-defined.

9
  • Phase 5 Deployment
  • In the final deployment phase of a secure SDLC,
    the different components of the platform interact
    with each other. Platform security cannot be
    ignored, for while the application itself might
    be secure, the platform it operates on might have
    exploitable flaws. Platforms thus need to be made
    secure by turning off unwanted services, running
    the machines on the least privilege principle,
    and making sure there are security safeguards
    such as IDS, firewalls, and so on.
  • Development, as the very name suggests, is an
    on-going process. Updates, patches and
    enhancements to the application code are
    constantly required. It is a cycle that repeats
    itself, but security, even at the time of these
    modifications, must always be in focus to ensure
    a robust and secure SDLC.

10
You can always contact with SECURIUM FOX. You can
contact us through our email addresses or by
using the contact form on the side.
  • INFO
  • 3rd Floor,Lohia Towers,
  • Nirmala Convent Rd,
  • Gurunanak Nagar,Patamata,Vijyawada,
  • Andhra Pradesh -520010
  • 9652038194
  • 08666678997
  • info_at_securiumfoxtechnologies.com

11
  • info_at_securiumfoxtechnologies.com
  • Andhra Pradesh Office
  • 91 8666678997,91 91652038194
  • 3rd Floor,Lohia Towers,
  • Nirmala Convent Rd,Gurunanak Nagar,Patamata,Vijaya
    wada,
  • info_at_securiumfoxtechnologies.com
  • UK Office
  • 44 2030263164
  • Velevate, Kemp House, 152 - 160,City Road,EC1V
    2NX
  • London
  • info_at_securiumfoxtechnologies.com
  • Tamil Nadu Office
  • 91 9566884661
  • Kailash Nagar, Nagar, Tiruchirappalli, Tamil Nadu
    620019
  • info_at_securiumfoxtechnologies.com
  • Noida Office
  • 91 (120) 4291672, 91 9319918771
  • A-25, Block A,
  • Second Floor,Sector - 3,
  • Noida, India
  • info_at_securiumfoxtechnologies.com
  • USA Office
  • 1 (315)933-3016
  • 33 West,17th Street,
  • New York,
  • NY-10011, USA
  • info_at_securiumfoxtechnologies.com
  • Dubai Office
  • 971 545391952
  • Al Ansari Exchange, Ansar Gallery - Karama
    Branch, Hamsah-A Building - 3 A St - Dubai -
    United Arab Emirates
Write a Comment
User Comments (0)