Current location - Education and Training Encyclopedia - Education and training - Software security development life cycle book catalogue
Software security development life cycle book catalogue
Requirements for SDL in Part 1

Chapter 65438 +0 Enough is enough: The threat is quietly changing 3

1. 1 Security and privacy conflicts around the world 5

1.2 Another factor affecting safety: reliability 8

1.3 is related to quality 10.

1.4 Why do major software developers need to develop more secure software 1 1

1.5 Why do internal software developers need to develop more secure software 12

1.6 Why do small software developers need to develop more secure software 12

1.7 summary 13

Reference 13

Chapter 2 The current software development methods are not enough to generate secure software 17.

2. 1 "As long as enough attention is paid, all defects will have nowhere to hide" 18.

2. 1. 1 power review code 18

2. 1.2 Understanding security errors 19

2. 1.3 number of personnel 19

2. 1.4 "The more concerned", the easier it is to drop 20 points.

2.2 patent software development mode 2 1

2.3 Agile Development Mode 22

2.4 General evaluation criteria 22

2.5 Summary 23

Reference 24

Chapter 3 A Brief History of Microsoft SDL 27

3. 1 prelude 27

3.2 New threats and new countermeasures 29

3.3Windows2000 and SecureWindowsInitiative30

3.4 the pursuit of scalability: running through WindowsXP32

3.5 Safety Publicity and Final Safety Review (FSR)33

3.6 Form a software security development life cycle 36

3.7 Persistent challenges 37

Reference 38

Chapter 4 Management of SDL4 1

4. 1 Commitment to success

Microsoft's Commitment 4 1

Do you need SDL? 43

4. 1.3 Effective commitment 45

4.2 managing SDL48

4.2. 1 resources 48

4.2.2 Is the project on track? 50

4.3 Summary 5 1

Reference 5 1

Part 2 Software security development life cycle process

Chapter 5 Stage 0: Education and Awareness 55

5. 1 A Brief History of Microsoft Safety Education 56

5.2 Continuing education 58

5.3 Training Delivery Type 60

5.4 Practice and Experiment 6 1

5.5 Tracking participation and compliance 62

5.6 Measurement knowledge 63

5.7 Realizing self-help training 63

5.8 Key success factors and quantitative indicators 64

5.9 Summary 65

Reference 65

Chapter 6 Stage 1: Project Initiation 67

6. 1 Judge whether the software security development life cycle covers the application 67

6.2 Appointment of security advisers 68

6.2. 1 serves as a bridge between the development team and the security team.

6.2.2 Convene the development team to hold the SDL kick-off meeting 70

6.2.3 Review the design and threat model of the development team 70

6.2.4 Analyze and classify bugs, such as security and privacy.

6.2.5 Development team safety loudspeaker 7 1

6.2.6 Assist the development team to prepare the final safety audit 7 1.

6.2.7 Cooperate with the corresponding safety team 7 1

6.3 Establish a safety leading group 7 1

6.4 Ensure that the defect tracking management process contains security and privacy defects 72.

6.5 Establishing "Error Criteria" 74

6.6 Summary 74

Reference 74

Chapter 7, Phase 2: Define and Follow Design Best Practices 75

Reference 90

Chapter 8 Stage 3: Product Risk Assessment 93

Chapter 9 Stage 4: Risk Analysis 10 1

Chapter 10 Stage 5: Creating Security Documents, Tools and Customer Best Practices 133

Chapter 1 1 Stage 6: Security Coding Strategy 143

Chapter 12 Stage 7: Safety Testing Strategy 153

Chapter 13 Stage 8: Safety Publicity Activities 169

Chapter 14 Stage 9: Final Safety Review 18 1

Chapter 15 Stage 10: Safety Response Plan 187

Chapter 16 Stage 1 1: Product Release 2 15

Chapter 17 Stage 12: Safety Response Execution 2 17

Part iii SDL

reference data

Chapter 18 Integrating SDL225 in Agile Mode

Reference 239

Chapter 19 SDL disables function call 24 1

Chapter 20 SDL Minimum Encryption Standard 25 1

2 1 chapter SDL necessary tools and compiler options 259

……