OSS SSD Guide
1.0
Table of Contents
Introduction
Defining security
Security in the SDLC
Threats in the requirements phase
Threats in the architecture phase
Third party software components
Threats in the coding phase
Verification methods
Integrating the practices
Topics left undiscussed
References
OSS SSD Guide
Docs
»
The OSS SSD Guide
The OSS SSD Guide
ΒΆ
Version 1.0 by Tim Hemel.
Table of Contents
Introduction
The need for secure software
Structure of this guide
About this guide
Defining security
What is security?
Taking risks
Finding threats
Determining threat impact
Summary
Security in the SDLC
The Software Development Lifecycle (SDLC)
Security problems and remedies in the SDLC
Summary
Threats in the requirements phase
STRIDE
Finding business level security requirements
Finding user interaction level security requirements
Finding system level security requirements
Security assumptions
Summary
Threats in the architecture phase
Architectural description
Analyzing the architecture
Other approaches
Summary
Third party software components
Checking for known vulnerabilities
Tools for vulnerability checking
Summary
Threats in the coding phase
Secure coding standard
Code security review
Tools
Summary
Verification methods
Functional tests
Formal methods
Code review
Pentest
Vulnerability scan
Fuzzing
Summary
Integrating the practices
Making security visible
Security assumptions
When to do what
Discussions about security
Dealing with security findings
Finding people
Getting started with security practices
Growing the security practices
Summary
Topics left undiscussed
Users
Malicious developers
Secure workflow
Secure deployment
Secure release and distribution
Security software
Privacy
References