๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Practical Core Software Security: A Reference Framework

โœ Scribed by James F Ransome, Mark S Merkow, Anmol


Publisher
Auerbach Pub
Year
2022
Tongue
English
Leaves
287
Series
Contemporary Issues in Social Science Research
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This textbook explains developer-centric software security, a holistic process to engage security. As long as software is developed by humans, it requires the human element to fix it. It outlines a step-by-step process for software security that is focused on educating graduate and undergraduate students.

โœฆ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Dedications
Table of Contents
List of Figures
List of Tables
Preface
About the Book
Audience
Support
Structure
Assumptions
Acknowledgments
About the Authors
Chapter 1: Introduction
Chapter Overview
Chapter Take-Aways
1.1 The Importance and Relevance of Software Security
1.2 Software Security and the Software Development Life Cycle
1.3 Quality Versus Secure Code
1.4 The Three Most Important SDL Security Goals
1.5 Threat Modeling and Attack Surface Validation
1.6 Summary
Chapter Quick-Check
Exercises
References
Chapter 2: The Security Development Lifecycle
Chapter Overview
Chapter Take-Aways
2.1 Overcoming Challenges in Making Software Secure
2.2 Software Security Maturity Models
2.3 ISO/IEC 27034โ€”Information Technologyโ€”Security Techniquesโ€”Application Security
2.4 Other Resources for SDL Best Practices
2.4.1 SAFECode
2.4.2 U.S. Department of Homeland Security Software Assurance Program
2.4.3 National Institute of Standards and Technology
2.4.4 Common Computer Vulnerabilities and Exposures
2.4.5 SANS Institute Top Cyber Security Risks
2.4.6 U.S. Department of Defense Cyber Security and Information Systems Information Analysis Center (CSIAC)
2.4.7 CERT, Bugtraqยฎ, and SecurityFocus
2.5 Critical Tools and Talent
2.5.1 The Tools
2.5.2 The Talent
2.6 Principles of Least Privilege
2.7 Privacy
2.8 The Importance of Metrics
2.9 Mapping the Security Development Lifecycle to the Software Development Life Cycle
2.10 Software Development Methodologies
2.10.1 Waterfall Development
2.10.2 Agile Development
2.11 Summary
Chapter Quick-Check
Exercises
References
Chapter 3: Security Assessment (A1): SDL Activities and Best Practices
Chapter Overview
Chapter Take-Aways
3.1 Software Security Team Is Looped in Early
3.2 Software Security Hosts a Discovery Meeting
3.3 Software Security Team Creates an SDL Project Plan
3.4 Privacy Impact Assessment (PIA) Plan Initiated
3.5 Security Assessment (A1) Key Success Factors and Metrics
3.5.1 Key Success Factors
3.5.2 Deliverables
3.5.3 Metrics
3.6 Summary
Chapter Quick-Check
Exercises
References
Chapter 4: Architecture (A2): SDL Activities and Best Practices
Chapter Overview
Chapter Take-Aways
4.1 A2 Policy Compliance Analysis
4.2 SDL Policy Assessment and Scoping
4.3 Threat Modeling/Architecture Security Analysis
4.3.1 Threat Modeling
4.3.2 Data Flow Diagrams
4.3.3 Architectural Threat Analysis and Ranking of Threats
4.3.4 Risk Mitigation
4.4 Open-Source Selection
4.5 Privacy Information Gathering and Analysis
4.6 Key Success Factors and Metrics
4.6.1 Key Success Factors
4.6.2 Deliverables
4.6.3 Metrics
4.7 Summary
Chapter Quick-Check
Exercises
References
Chapter 5: Design and Development (A3): SDL Activities and Best Practices
Chapter Overview
Chapter Take-Aways
5.1 A3 Policy Compliance Analysis
5.2 Security Test Plan Composition
5.3 Threat Model Updating
5.4 Design Security Analysis and Review
5.5 Privacy Implementation Assessment
5.6 Key Success Factors and Metrics
5.6.1 Key Success Factors
5.6.2 Deliverables
5.6.3 Metrics
5.7 Summary
Chapter Quick-Check
Exercises
References
Chapter 6: Design and Development (A4): SDL Activities and Best Practices
Chapter Overview
Chapter Take-Aways
6.1 A4 Policy Compliance Analysis
6.2 Security Test Case Execution
6.3 Code Review in the SDLC/SDL Process
6.4 Security Analysis Tools
6.4.1 Static Analysis
6.4.2 Dynamic Analysis
6.4.3 Fuzz Testing
6.4.4 Manual Code Review
6.5 Key Success Factors
6.6 Deliverables
6.7 Metrics
6.8 Summary
Chapter Quick-Check
Exercises
References
Chapter 7: Ship (A5): SDL Activities and Best Practices
Chapter Overview
Chapter Take-Aways
7.1 A5 Policy Compliance Analysis
7.2 Vulnerability Scan
7.3 Code-Assisted Penetration Testing
7.4 Open-Source Licensing Review
7.5 Final Security Review
7.6 Final Privacy Review
7.7 Key Success Factors
7.8 Deliverables
7.9 Metrics
7.10 Summary
Chapter Quick-Check
Exercises
References
Chapter 8: Post-Release Support (PRSA1โ€“5)
Chapter Overview
Chapter Take-Aways
8.1 Right-Sizing Your Software Security Group
8.1.1 The Right Organizational Location
8.1.2 The Right People
8.1.3 The Right Process
8.2 PRSA1: External Vulnerability Disclosure Response
8.2.1 Post-Release PSIRT Response
8.2.2 Post-Release Privacy Response
8.2.3 Optimizing Post-Release Third-Party Response
8.3 PRSA2: Third-Party Reviews
8.4 PRSA3: Post-Release Certifications
8.5 PRSA4: Internal Review for New Product Combinations or Cloud Deployments
8.6 PRSA5: Security Architectural Reviews and Tool-Based Assessments of Current, Legacy, and M&A Products and Solutions
8.6.1 Legacy Code
8.6.2 Mergers and Acquisitions (M&As)
8.7 Key Success Factors
8.8 Deliverables
8.9 Metrics
8.10 Summary
Chapter Quick-Check
Exercises
References
Chapter 9: Adapting Our Reference Framework to Your Environment
Chapter Overview
Chapter Take-Aways
9.1 Overview of the Top Four Environments in Which You Are Likely to Deploy Your SDL
9.1.1 Agile
9.1.2 DevOps
9.1.3 Cloud
9.1.4 Digital Enterprise
9.2 Key Success Factors, Deliverables, and Metrics for Each Phase of Our SDL Reference Framework
9.3 Software Security Maturity Models and the SDL
9.3.1 Maturity Models for Security and Resilience
9.3.2 Software Assurance Maturity Modelโ€”OpenSAMM
9.4 The Building Security In Maturity Model (BSIMM)
9.4.1 BSIMM Organization
9.4.2 BSIMM Software Security Framework
9.4.3 Deployment
9.4.4 BSIMMโ€™s 12 Practice Areas
9.4.5 Measuring Results with BSIMM
9.4.6 The BSIMM Community
9.4.7 Conducting a BSIMM Assessment
9.4.8 Section Summary
9.5 Enhancing Your Threat Modeling Practice As Part of the SDL
9.5.1 Practical Threat and Application Risk Modeling
9.5.2 MITRE ATT&CKยฎ and MITRE D3FENDยฎ
9.6 Pulling It All Together
9.7 Overcoming Organizational and Business Challenges with a Properly Designed, Managed, and Focused SDL
9.8 Software Security Organizational Realities and Leverage
9.9 Future Predictions for Software Security
9.9.1 The Bad News
9.9.2 The Good News
9.10 Comprehensive SDL Review
9.11 Conclusion
References
Appendix A: Case Study for Chapters 3 Through 8 Exercises
Appendix B: Answers to Chapter Quick-Check Questions
Glossary
Index


๐Ÿ“œ SIMILAR VOLUMES


Core Software Security: Security at the
โœ James Ransome, Anmol Misra ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Auerbach Publications ๐ŸŒ English

"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats." โ€”Dr. Dena Haritos Tsamitis. Carnegie Mellon University "..

Core Software Security: Security at the
โœ Ransome, James F;Misra, Anmol ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Auerbach Publications ๐ŸŒ English

<em>"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."<br /></em><b>--Dr. Dena Haritos Tsamitis. Carnegie Mel

Core Software Security: Security at the
โœ James Ransome, Anmol Misra ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Auerbach Publications,CRC Press ๐ŸŒ English

<P><EM>"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products.ย ... Readers are armed with firm solutions for the fight against cyber threats."<BR></EM><B>โ€”Dr. Dena Haritos Tsamitis. Carnegie Mel

IT Security Metrics: A Practical Framewo
โœ Lance Hayden ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

<h4>Implement an Effective Security Metrics Project or Program</h4> <p> IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effecti

IT Security Metrics: A Practical Framewo
โœ Lance Hayden ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› McGraw Hill ๐ŸŒ English

Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strate