Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Development
    • IT Management

    Secure Application Development Report Expands Security Framework

    Written by

    Brian Prince
    Published May 12, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A team of security researchers has released a report laying the groundwork for enterprises to compare and assess the security strength of their application development processes.

      The report, Building Security in Maturity Model 2, describes 109 activities carried out at organizations such as Intel and Bank of America as part of their secure development life cycle. All told, the report covers software development practices at 30 enterprises, and according to the authors is intended to provide benchmarks for companies concerned about application security.

      “The biggest problem for a lot of organizations is simply getting started, or pulling together the small, disparate activities that were going on into a real software security initiative,” said Sammy Migues, a principal at Cigital and co-author of the report. “Everyone we talked to said there were a couple of things that really made that happen. One … was making somebody responsible for the problem.”

      All 30 of the organizations examined by Migues and co-authors Brian Chess of Fortify Software and Gary McGraw of Cigital had an SSG (software security group), though the size of the teams varied. The teams need to go beyond finding bugs, however, and should include people with good communication skills capable of mentoring, training and working with developers within the organization, the report contends.

      “At the highest level of organization, SSGs come in three major flavors: those organized according to technical SDLC [secure development life cycle] duties, those organized by operational duties and those organized according to internal business units,” the report said. “Some SSGs are highly distributed across a firm, and others are very centralized and policy-oriented.”

      “This is a more controversial point in the world than you might guess it is,” said Chess, chief scientist at Fortify. “Not everyone agrees that you need to have a dedicated software security team, but everybody we observed in this set has one.”

      As for the model itself, it covers four domains: governance, intelligence, secure software development life-cycle touchpoints and deployment. Among the activities involved are actions in areas such as code review, creating attack models, developing security metrics and training developers.

      “There are three levels of activities that we have observed out there,” said McGraw, CTO of Cigital. “Easy stuff, that’s level one; stuff that may require level one stuff to be done before you can do it, it’s a little bit harder, that’s level two; and then rocket science, that’s level three.”

      The activities are spread across the three levels. For example, there are seven activities under the penetration testing banner, with the most basic being the use of pen testing tools, conducting periodic tests and giving testers all the information necessary to do their job effectively.

      In addition to the challenge of organizing software security efforts, many companies struggle with the development of security metrics, which they typically come up with on their own, Chess said.

      “One of the things that I’ve discovered over the years is that metrics are kind of like internal organs,” McGraw agreed. “Everybody needs a liver, but it’s really hard to take my liver and put it in somebody else’s body.”

      The report can be downloaded here.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×