𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Building secure business applications at Microsoft

✍ Scribed by John Steer; Ashish Popli


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
218 KB
Volume
13
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

✦ Synopsis


Like many global enterprises, Microsoft depends on internally developed and third-party line-of-business (LOB) applications to run its daily business activities. Nearly 4000 LOB applications are in service at Microsoft including a significant number of applications that contain business-sensitive data, customer data, or confidential employee data.

In 2001 the Microsoft IT organization wanted to make sure that the company's security risk was appropriately managed. The Security Development Life cycle for IT (SDL-IT) was created within Microsoft IT to keep track of, assess, and address potential security and privacy vulnerabilities found in LOB applications. A specialist team called the Application Consulting and Engineering (ACE) Team was formed to manage the program, providing support and oversight ensuring that application development teams adhere to the SDL-IT process.

This paper contains descriptions of the processes and standards that make up the SDL-IT process and discusses best practices that might be useful to other organizations wishing to create and enforce a security and privacy processes for LOB applications. While this paper describes Microsoft ITs own security and privacy process the authors recognize that every organization is unique and believe that the technology agnostic SDL-IT process and methodologies described can be implemented in other enterprises.


πŸ“œ SIMILAR VOLUMES


SC Johnson builds business at the base o
✍ Scott Johnson πŸ“‚ Article πŸ“… 2007 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 107 KB

## Abstract SC Johnson's sustainability strategy has led it to a unique partnership in Nairobi with a local community organization and groups of Kenyan youths. Together, they are pioneering a new business model, a product of field testing the Base of the Pyramid protocol, to create mutual value in

The Engineering Application and Case Ana
✍ WANG Xiao-lan; ZHU Guo-qing; ZHANG Guo-wei; WU Wei-hua πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier 🌐 English βš– 446 KB

Based on the concept of temporary evacuation, the 'quasi-security zone' was proposed to solve the evacuation problem in the large space building. The 'quasi-security zone' should be a safe refuge zone which should meet certain performance-based indicators. In case of fire, people could refuge in 'qu

Nanofabrication Towards Biomedical Appli
✍ Kumar, Challa S. S. R.; Hormes, Josef; Leuschner, Carola πŸ“‚ Article πŸ“… 2005 πŸ› Wiley-VCH Verlag GmbH & Co. KGaA βš– 567 KB

Physical and chemical functions of organisms are carried out by a very large number (billions) of proteins, of differing variety (~10 5 in humans), through predictable and self-sustaining interactions, developed through evolution. Using biology as a guide, in the molecular biomimetics approach we se