{"id":584,"date":"2021-03-14T17:05:57","date_gmt":"2021-03-14T21:05:57","guid":{"rendered":"https:\/\/www.gybernov.com\/new\/?p=584"},"modified":"2021-03-28T21:27:05","modified_gmt":"2021-03-29T01:27:05","slug":"ssdlc","status":"publish","type":"post","link":"https:\/\/www.gybernov.com\/new\/ssdlc\/","title":{"rendered":"Secure Software Development Life Cycle (SSDLC)"},"content":{"rendered":"<figure><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/spiral.png?w=660&#038;ssl=1\" alt=\"Sprial\" \/><figcaption>spiral<\/figcaption><\/figure>\n<figure><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/v-shaped.png?w=660&#038;ssl=1\" alt=\"V-shaped\" \/><figcaption>v-shaped<\/figcaption><\/figure>\n<figure><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/waterfall.png?w=660&#038;ssl=1\" alt=\"Waterfall\" \/><figcaption>waterfall<\/figcaption><\/figure>\n<figure><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/agile.png?w=660&#038;ssl=1\" alt=\"Agile\" \/><figcaption>agile<\/figcaption><\/figure>\n<figure><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/iterative.png?w=660&#038;ssl=1\" alt=\"Iterative\" \/><figcaption>iterative<\/figcaption><\/figure>\n<p>The most important principle of SSDLC (Secure Software Development Life Cycle) is to offer a secure development process thus minimizing the risk of vulnerabilities in our solution that we develop, Organisations that implement that style of development will significantly reduce the weaknesses and threats of exploitation<\/p>\n<p>It also brings a layer of quality during our\u00a0 QA stage.<\/p>\n<p><b>QA vs Security\u00a0<\/b><\/p>\n<p>Quality assurance allows to verify and validate that a given application works as desired by the user and by &#8220;business owners&#8221;. and It concerns the application reliability.<\/p>\n<p>A secure development adds quality to software, but the opposite is not always true<\/p>\n<p>Having the security functions does not mean that the application is enough secure. Indeed, these security functions can be disabled by default and can be poorly implemented or poorly designed and include security vulnerabilities.<\/p>\n<p>all security activities are stated here, we will explain each step in next week to give you better picture and help you to take advantage on the process<br \/>\njust keep in mind the follwing standards :<\/p>\n<ul>\n<li>ISO 27034<\/li>\n<li>SP 800-160 Vol. 2<\/li>\n<li>PA-DSS<\/li>\n<\/ul>\n<p>and also<\/p>\n<ul>\n<li>ISO\/IEC 21827:2008<\/li>\n<li>ISO\/IEC 25000:2014<\/li>\n<li>NIST SP 800-61 Rev. 2<\/li>\n<\/ul>\n<p><strong>Training<\/strong><br \/>\n<strong>Requirements<\/strong><\/p>\n<ul>\n<li>Security Requirements<\/li>\n<li>Quality Gates\/Bug Bars<\/li>\n<li>Security and Privacy Risk Assessment<\/li>\n<\/ul>\n<p><strong>Design<\/strong><\/p>\n<ul>\n<li>Design Requirements<\/li>\n<li>Attack Surface Reduction<\/li>\n<li>Threat Modeling<\/li>\n<\/ul>\n<p><strong>Implementation<\/strong><\/p>\n<ul>\n<li>Use Approved Tools<\/li>\n<li>Deprecate Unsafe Functions<\/li>\n<li>Static Analysis<\/li>\n<\/ul>\n<p><strong>Verification<\/strong><\/p>\n<ul>\n<li>Dynamic Program Analysis<\/li>\n<li>Fuzz Testing<\/li>\n<li>Threat Model and Attack Surface Review<\/li>\n<\/ul>\n<p><strong>Release<\/strong><\/p>\n<ul>\n<li>Incident Response Plan<\/li>\n<li>Final Security Review<\/li>\n<li>Release\/Archive<\/li>\n<\/ul>\n<p><strong>Optional Activities<\/strong><\/p>\n<ul>\n<li>Manual Code Review<\/li>\n<li>Penetration Testing<\/li>\n<li>Vulnerability Analysis of Similar Applications<\/li>\n<\/ul>\n<p><a href=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"notes - Security activities development life cycle - Gybernov.com\"><br \/>\n<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_-1024x398.jpg?resize=660%2C257&#038;ssl=1\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" srcset=\"https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?resize=1024%2C398&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?resize=300%2C117&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?resize=768%2C298&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?resize=1536%2C597&amp;ssl=1 1536w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?resize=600%2C233&amp;ssl=1 600w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?w=1603&amp;ssl=1 1603w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_.jpg?w=1320&amp;ssl=1 1320w\" alt=\"\" width=\"660\" height=\"257\" \/> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most important principle of SSDLC (Secure Software Development Life Cycle) is to offer a secure development process thus minimizing the risk of vulnerabilities in our solution that we develop, Organisations that implement that style of development will significantly reduce the weaknesses and threats of exploitation<\/p>\n<p>It also brings a layer of quality during our  QA stage.<\/p>\n","protected":false},"author":3,"featured_media":407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"hide_page_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,11],"tags":[],"class_list":["post-584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-governance","category-r-d"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/scott-graham-5fNmWej4tAA-unsplash.jpg?fit=%2C&ssl=1","jetpack-related-posts":[{"id":742,"url":"https:\/\/www.gybernov.com\/new\/sim-fraud\/","url_meta":{"origin":584,"position":0},"title":"MFA and SIM swap fraud !","author":"Editorial Team","date":"March 15, 2021","format":false,"excerpt":"You secure all access with MFA with mobile! but what about if your phone number was hijacked ? few personal questions and someone else can route your line to a fake SIM","rel":"","context":"In &quot;Awareness&quot;","block_context":{"text":"Awareness","link":"https:\/\/www.gybernov.com\/new\/category\/awareness\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=1200%2C874&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=1200%2C874&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=1200%2C874&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=1200%2C874&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=1200%2C874&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/scR73I-ssdlc","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/comments?post=584"}],"version-history":[{"count":81,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/584\/revisions"}],"predecessor-version":[{"id":1078,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/584\/revisions\/1078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/media\/407"}],"wp:attachment":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/media?parent=584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/categories?post=584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/tags?post=584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}