Upload
futurice
View
755
Download
0
Embed Size (px)
Citation preview
Security assurance
• Design principles• Static code analysis• External reviews• Penetration testing• ...
Misaligned
• External reviews• Analysis and validation• Test depth analysis• Manual security testing
Works anyway
• Architecture and design principles• High-level languages & run-time environments• Change tracking
Evil user stories
• From user stories• “How can this functionality be misused?”• Build security in
As an employee, I can search for other employees
by their last name
As an employee, I can alter the database by inserting
an SQL search string
Disconnected stories
“User adds “&debug=true” to URL on any page, and receives debug information that discloses system configuration details.”
Security Development Lifecycle
• Attack surface analysis• Threat modeling• Cryptography review• Response plan• ...