Incorporating Secure Design into Your Software Development Lifecycle

Design is a fundamental part of any mature Software Development Lifecycle (SDLC). During the design phase, the architecture of a software system is specified. The specification is then used by developers to implement the desired architecture. Given its prominent role in determining how the software is implemented, it is essential that secure design practices are followed so that the system produced will be secure.

 

One way to characterize the maturity of the security related activities of the of any phase of the SDLC is to use the OWASP Software Assurance Maturity Model (SAMM).

 

Image
tl-blog-ssdl-owasp@2x-100.jpg

Figure 1 – OWASP SAMM with a focus on Design

 

In this framework, the SDLC is broken down into 5 business functions. The activities of a given business function are grouped into 3 security practices, which are further broken down into 2 “streams” per practice. The three practices for the Design business function are Threat Assessment, Security Requirements and Security Architecture.

 

 

Threat Assessment

The first practice in the Design business function is Threat Assessment. The two streams in Threat Assessment are Application Risk Profile and Threat Modeling. The Application Risk Profile stream is concerned with determining the risk profile for the application under development. Factors such as exposure to the internet, the types of data stored and the availability requirements all play a role in determining the risk profile for the application. The risk profile will help provide guidance on the level of security controls needed to protect the application.

 

The second stream of the Threat Assessment practice is Threat Modeling. Threat modeling is an exercise where the system is analyzed for threats that the system may be exposed to during operation. Before a threat model can be completed, the basic architecture and data flows for the system must be specified. One common technique used for threat modeling is STRIDE, which provides a framework for classifying threats.

The classifications are:

 

  • Spoofing
  • Tampering
  • Repudiation
  • Information Disclosure
  • Denial of Service
  • Elevation of Privilege

 

Each component and data flow will be analyzed to determine if any threats from these categories are applicable to that component or flow. Any threats found should be recorded and tickets created for them in the defect or requirements tracking system to ensure remediation, tracking and testing of the issue.

 

 

Security Requirements

The second practice is Security Requirements, which consists of Software Requirements and Supplier Security. The Software Requirements stream involves specifying the security-related requirements for the system under development. Just as the required functionality and attributes of a software system need to be captured in requirements, so, too, do the security-related attributes and functionality of the system. These will be dictated in large measure by the risk profile of the application being developed. A high-risk, high-exposure application will have much more stringent security requirements than a low-risk, low-exposure one.

 

Security requirements not only apply to in-house software, but also to external third-party providers. The Supplier Security stream covers this case and should encompass both software and service providers. It is important that the security requirements are applied to all suppliers, as well as in-house development, since third-party components play such a large role in modern software development.

 

 

Security Architecture

The third practice of the Design business function is Security Architecture, which can be broken down into Architecture Design and Technology Management. Architecture Design covers the basic architecture of the system, while Technology Management concerns the underlying technologies that are used to implement the architecture.

 

When designing a secure software system, it is essential to incorporate secure design principles in the design process. Some of the fundamental principles that need to be considered are:

 

  • Least Privilege
  • Separation of Duties
  • Fail Safe
  • Open Design
  • Economy of Mechanism
  • Defense in Depth
  • Least Common Mechanism
  • Complete Mediation
  • Psychological Acceptability

 

Using these principles will help prevent design-related security vulnerabilities that are often more difficult to detect and fix than run-of-the-mill coding vulnerabilities.

 

All software systems depend upon a set of technologies for their development, testing and deployment. These include development tools, deployment tools, databases and operating systems. The particular technologies employed will impact the overall security posture of the software, and so is important to understand the security implications of the technologies chosen to implement the system. The system needs to be designed taking these implications into account. The system should also utilize the technologies in standard ways, where the security implications are well understood. Best practices for each technology should always be followed.

 

Threat Assessment, Security Requirements and Security Architecture are all essential parts of designing secure software. Neglecting any of them will expose the system to unnecessary risk. The next post will further explore the threat assessment practice.

Tim Sotack
Senior Consultant | Optiv
Timothy Sotack is a Senior Consultant in Application Security Services at Optiv. Tim has over 16 years of experience in application security. His experience ranges from the development of web application scanners to implementing a secure development lifecycle process across a suite of products that included web applications, APIs, desktop apps, and plugins for IDEs and CI/CD tools. He is a subject matter expert in implementing SDLC initiatives, secure coding practices, vulnerability remediation, and the implementation of security features.

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?