Download free course The Security Development Lifecycle, pdf file on 348 pages by Michael Howard, Steve Lipner.
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL - from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.
Discover how to:
- Use a streamlined risk-analysis process to find security design issues before code is committed
- Apply secure-coding best practices and a proven testing process
- Conduct a final security review before a product ships
- Arm customers with prescriptive guidance to configure and deploy your product more securely
- Establish a plan to respond to new security vulnerabilities
- Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum.
Table of contentsThe Need for the SDL
Enough Is Enough: The Threats Have Changed
Current Software Development Methods Fail to Produce Secure Software
A Short History of the SDL at Microsoft
SDL for Management
The Security Development Lifecycle Process
Stage 0: Education and Awareness
Stage 1: Project Inception
Stage 2: Define and FollowDesign Best Practices
Stage 3: Product Risk Assessment
Stage 4: Risk Analysis
Stage 5: Creating Security Documents, Tools, and Best Practices for Customers
Stage 6: Secure Coding Policies
Stage 7: Secure Testing Policies
Stage 8: The Security Push
Stage 9: The Final Security Review
Stage 10: Security Response Planning
Stage 11: Product Release
Stage 12: Security Response Execution
SDL Reference Material
Integrating SDL with Agile Methods
SDL Banned Function Calls
SDL Minimum Cryptographic Standards
SDL-Required Tools and Compiler Options
Threat Tree Patterns
Others related eBooks about The Security Development Lifecycle
Network Security Tutorial
Download free Network Security Tutorial in PDF for beginners (Network Security Fundamentals, Why We Need Security, Definitions and Concepts)....
Security Infrastructure Technology for Integrated Utilization of Big Data
Download free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....
802.11 WLAN Systems Tutorial
Download free 802.11 WLAN Systems course material, tutorial training, a PDF in 53 pages by veriwave, free document designated to intermediate level users....
Beginner's Guide to IP Addresses
Download free IP Adresses Beginner's Tutorial course material by ICANN on 12 pages....
Managing Risk and Information Security
Download free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....
Industrial Internet
Download free course Industrial Internet, pdf file on 51 pages by Jon Bruner....
Introduction to Network security
Download a free Network security training course material ,a PDF file unde 16 pages by Matt Curtin....
An Introduction to Computer Networks
Download free course An Introduction to Computer Networks, pdf file on 896 pages by by Peter L Dordal....
Rational Cybersecurity for Business
Download free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....
The Internet Myth
Download free course The Internet Myth, pdf file on 169 pages by Paolo Bory....