Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Experts Say Its Time to Write Secure Code

    Written by

    Dennis Fisher
    Published February 23, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The term “software security” usually conjures images of aftermarket measures like intrusion detection, anti-virus and firewalls.

      Gary McGraw is on a mission to change that.

      What developers should be thinking about is writing more secure and reliable code and including basic security measures in their applications, not relying on customers to lock them down once the software is deployed.

      And IT managers and CIOs should be using their checkbooks to let vendors know that theyre no longer interested in buying flawed code, McGraw said.

      “Its time to do software security. Theres been enough philosophizing and hype. Now everyone knows we have a problem and wants to know what to do about it,” said McGraw, the CTO at Cigital, in Dulles Va., and the author of a new book, aptly titled “Software Security: Building Security In.”

      /zimages/3/28571.gifIs It the End of the Security World as We Know It? Click here to read more.

      The book is a step-by-step blueprint for developers interested in building more secure code from the ground up and centers on seven “touchpoints” for software security.

      The tenets include code review, risk analysis, penetration testing, risk-based security tests, abuse cases, security requirements and security operations.

      McGraw is under no illusions that ISVs and in-house developers at other enterprises will be adopting this plan wholesale. Change takes time. But, if nothing else, he hopes development organizations will at least take the minimal steps of using static analysis tools to scan code, and performing risk analysis audits of their applications before they ship.

      Perhaps the best-known example of a company getting religion on software security is Microsoft, with its Secure Development Lifecycle process.

      The company has developed the process over the course of several years and continues to tweak it as need be. Microsoft also has built its own static analysis tools, PREfix and PREfast.

      Oracle has begun using a similar tool, Fortifys Source Code Analysis suite, to audit its code.

      But, as McGraw and other experts point out, such tools are only one piece of a much larger puzzle.

      Mike Howard, a senior security program manager at Microsoft, and author of “Writing Secure Code,” pointed out in his blog recently that developers must be careful not to place too much faith in code-scanning tools.

      “Such tools, often called static analysis tools, such as the tools we have included in Visual Studio 2005, are very useful, but they are no replacement for human intellect,” Howard wrote.

      “If a developer does not know how to code securely, or if a designer does not know how to design secure systems, and testers dont know how to validate the security-posture of code, tools will provide little, if any, help.”

      “I agree with Mike on that,” McGraw said. “I just dont believe any tool is the be all and end all. Static analysis is not going to fix everything, but you sure as hell ought to be doing it.”

      Despite the success that Microsoft and other software companies have had in cleaning up their code before shipping it, McGraw said that the majority of ISVs still havent gotten the message. In fact, development shops in financial services companies and other non-technology organizations are taking the lead on developing secure code.

      “Its not the software vendors so much. Its all of the other people who are doing it,” he said. “Qualcomm, Coke. Were making good inroads, but we need developers to get behind this idea.

      “It takes market demand [for change to happen]. Consumers for some odd reason think that everything is secure, and when they find out its not, they get [mad],” McGraw said.

      “These companies are finding out that people have implicit expectations that software will be secure.”

      Many companies in recent years have taken to using penetration testers to attack their applications either after theyve already been deployed or in the predeployment testing phase.

      But this kind of test is only as good as the tester and the results only show what vulnerabilities exist at one given point in time. Given the dynamic nature of enterprise networks, the test results are likely out-of-date by the time the CIO gets them.

      “Pen testing has devolved into a feel good exercise. The reformed hackers [doing the test] find five problems and maybe tell you about two of them. Its usually incredibly surface-level stuff,” McGraw said.

      /zimages/3/28571.gifClick here to read about Microsofts bevy of security betas.

      “The hackers feel good, the customers feel good and the VP feels good because he gets to check off the security box and go home.”

      Along with Microsofts Howard, McGraw is part of a small cadre of experts that has been agitating for better software development processes and more education on secure coding practices for developers as a more efficient and effective way of addressing the epidemic of security flaws in commercial software.

      But adopting a framework like McGraws or Microsofts takes time, discipline and a commitment from not just the IT organization, but upper management as well.

      And, as McGraw is quick to point out, breaking code is far simpler than writing unbreakable code. Or, as Dan Geer said in his foreword to “Software Security”: “I personally prefer Sam Rayburns earthy formulation, viz.: Any jackass can kick down a barn, but it takes a good carpenter to build one.”

      /zimages/3/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×