Tuesday, September 3, 2019


Security review of a product involves the following activities:
Analysis:
Threat Modeling
Perform detailed design analysis
List Assets, Activity matrix and Actions chart
Identify threats
Mitigate threats
Static Analysis
            Perform code scanning activity
Perform binary scanning activity
Publish Code Analysis Reports for review by component owners
Publish Binary Analysis Reports for review by component owners
Mitigate risks from Code Analysis
Mitigate risks from Binary Analysis

Network Vulnerability Scanning:
                Use available tools on a deployed instance of the product
Publish findings from the tool
Mitigate risks from the findings
Web Security testing:
Request PSO office to perform testing
Publish findings from the testing
Mitigate risks from the findings
Malware scanning:
            Request Malware detection
Publish findings from malware detection
Mitigate any findings

Third party components
Harden third party components
Use latest secure versions
Source third party components

Documentation:
Provide a security configuration guide
Document known false positives
Vulnerability response plan
Patching Capability plan

Governance:
Participate in Security Training
Security Champions identified
Enforce coding conventions
Periodic security review with Business Unit

                               

No comments:

Post a Comment