A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Breadcrumb Home Insights Source Zero Incorporating Secure Design into Your Software Development Lifecycle March 23, 2023 Incorporating Secure Design into Your Software Development Lifecycle Design is a fundamental part of any mature Software Development Lifecycle (SDLC). During the design phase, the architecture of a software system is specified. The specification is then used by developers to implement the desired architecture. Given its prominent role in determining how the software is implemented, it is essential that secure design practices are followed so that the system produced will be secure. One way to characterize the maturity of the security related activities of the of any phase of the SDLC is to use the OWASP Software Assurance Maturity Model (SAMM). Image Figure 1 – OWASP SAMM with a focus on Design In this framework, the SDLC is broken down into 5 business functions. The activities of a given business function are grouped into 3 security practices, which are further broken down into 2 “streams” per practice. The three practices for the Design business function are Threat Assessment, Security Requirements and Security Architecture. Threat Assessment The first practice in the Design business function is Threat Assessment. The two streams in Threat Assessment are Application Risk Profile and Threat Modeling. The Application Risk Profile stream is concerned with determining the risk profile for the application under development. Factors such as exposure to the internet, the types of data stored and the availability requirements all play a role in determining the risk profile for the application. The risk profile will help provide guidance on the level of security controls needed to protect the application. The second stream of the Threat Assessment practice is Threat Modeling. Threat modeling is an exercise where the system is analyzed for threats that the system may be exposed to during operation. Before a threat model can be completed, the basic architecture and data flows for the system must be specified. One common technique used for threat modeling is STRIDE, which provides a framework for classifying threats. The classifications are: Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege Each component and data flow will be analyzed to determine if any threats from these categories are applicable to that component or flow. Any threats found should be recorded and tickets created for them in the defect or requirements tracking system to ensure remediation, tracking and testing of the issue. Security Requirements The second practice is Security Requirements, which consists of Software Requirements and Supplier Security. The Software Requirements stream involves specifying the security-related requirements for the system under development. Just as the required functionality and attributes of a software system need to be captured in requirements, so, too, do the security-related attributes and functionality of the system. These will be dictated in large measure by the risk profile of the application being developed. A high-risk, high-exposure application will have much more stringent security requirements than a low-risk, low-exposure one. Security requirements not only apply to in-house software, but also to external third-party providers. The Supplier Security stream covers this case and should encompass both software and service providers. It is important that the security requirements are applied to all suppliers, as well as in-house development, since third-party components play such a large role in modern software development. Security Architecture The third practice of the Design business function is Security Architecture, which can be broken down into Architecture Design and Technology Management. Architecture Design covers the basic architecture of the system, while Technology Management concerns the underlying technologies that are used to implement the architecture. When designing a secure software system, it is essential to incorporate secure design principles in the design process. Some of the fundamental principles that need to be considered are: Least Privilege Separation of Duties Fail Safe Open Design Economy of Mechanism Defense in Depth Least Common Mechanism Complete Mediation Psychological Acceptability Using these principles will help prevent design-related security vulnerabilities that are often more difficult to detect and fix than run-of-the-mill coding vulnerabilities. All software systems depend upon a set of technologies for their development, testing and deployment. These include development tools, deployment tools, databases and operating systems. The particular technologies employed will impact the overall security posture of the software, and so is important to understand the security implications of the technologies chosen to implement the system. The system needs to be designed taking these implications into account. The system should also utilize the technologies in standard ways, where the security implications are well understood. Best practices for each technology should always be followed. Threat Assessment, Security Requirements and Security Architecture are all essential parts of designing secure software. Neglecting any of them will expose the system to unnecessary risk. The next post will further explore the threat assessment practice. By: Timothy Sotack Senior Consultant | Optiv Timothy Sotack is a Senior Consultant in Application Security Services at Optiv. Tim has over 16 years of experience in application security. His experience ranges from the development of web application scanners to implementing a secure development lifecycle process across a suite of products that included web applications, APIs, desktop apps, and plugins for IDEs and CI/CD tools. He is a subject matter expert in implementing SDLC initiatives, secure coding practices, vulnerability remediation, and the implementation of security features. Share: Red Team Source Zero® Application Security social engineering Data Breach Cyber Insurance Optiv Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?