D487 - Secure Software Design

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/66

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

67 Terms

1
New cards

SDLC Phase 1

planning - a vision and next steps are created

2
New cards

SDLC Phase 2

requirements - necessary software requirements are determined

3
New cards

SDLC Phase 3

design - requirements are prepared for the technical design

4
New cards

SDLC Phase 4

implementation - the resources involved in the application from a known resource are determined

5
New cards

SDLC Phase 5

testing - software is tested to verify its functions through a known environment

6
New cards

SDLC Phase 6

deployment - security is pushed out

7
New cards

SDLC Phase 7

maintenance - ongoing security monitoring is implemented

8
New cards

SDLC Phase 8

end of life - the proper steps for removing software completely are considered

9
New cards

BSIMM

a study of real-world software security that allows you to develop your software security over time

10
New cards

OWASP SAMM

flexible framework for building security into a software development organization

11
New cards

Static Analysis

the analysis of computer software that is performed without executing programs

12
New cards

Dynamic Analysis

the analysis of computer software that is performed when executing programs on a real or virtual processor in real time

13
New cards

Fuzz Testing

automated or semi-automated testing that provides invalid, unexpected, or random data to the computer software program

14
New cards

Waterfall Development

software development methodology that breaks down development activities into linear sequential phases; each phase depends on the deliverables of the previous one and corresponds to a specialization of tasks

15
New cards

Waterfall Phases (typical)

plan -> build -> test -> review -> deploy

16
New cards

Iterative Waterfall Development

each phase of a project is broken down into its own waterfall phases

17
New cards

Agile Development

software development methodology that delivers functionality in rapid iterations called timeboxes, requiring limited planning but frequent communication

18
New cards

Scrum

framework for Agile that prescribes for teams to break work into goals to be completed within sprints

19
New cards

Scrum Master (Scrum Role)

responsible for ensuring a Scrum team is operating as effectively as possible by keeping the team on track, planning and leading meetings, and working out any obstacles the team might face

20
New cards

Product Owner (Scrum Role)

ensures the Scrum team aligns with overall product goals by managing the product backlog by ordering work by priority, setting the product vision for the team, and communicating with external stakeholders to translate their needs to the team

21
New cards

Development Team (Scrum Role)

professionals who do the hands-on work of completing the tasks in a Scrum sprint by lending their expertise to program, design, or improve products

22
New cards

Lean Development

software development methodology that focuses on further isolating risk to the level of an individual feature

23
New cards

V-Model

a variation of the waterfall model, where the stage is turned back upwards after the coding phase

24
New cards

Extreme Programming (XP)

an Agile methodology that is intended to improve software quality and responsiveness

25
New cards

Software Security Architect

ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed

26
New cards

Software Security Champion

an expert on promoting security awareness, best practices, and simplifying software security

27
New cards

Software Security Evangelist

an expert to promote awareness of products to the wider software community

28
New cards

Functional Requirements

describe what the system will do and its core purpose

29
New cards

Non-Functional Requirements

describe any constraints or restrictions on a design but do not impact the core purpose of the system

30
New cards

Privacy Impact Assessment

process that evaluates issues and privacy impact rating in relation to the privacy of PII in the software

31
New cards

Product Risk Profile

helps to determine the actual cost of the product from different perspectives

32
New cards

Requirement Traceability Matrix

a table that lists all of the security requirements

33
New cards

DREAD model

damage, reproducibility, exploitability, affected users, discoverability

34
New cards

PASTA

the process for attack simulation and threat analysis; gives a software security team a repeatable framework for identifying threats

35
New cards

STRIDE

classifies threats into categories: spoofing, tampering, repudiation, information disclosed, denial of service, and elevation of privilege

36
New cards

Application Decomposition

determining the fundamental functions of an app

37
New cards

Trike

a unified conceptual framework for security auditing

38
New cards

Alpha Level Testing

testing done by the developers themselves

39
New cards

Beta Level Testing

testing done by those not familiar with the actual development of the system

40
New cards

Black Box Testing

tests from an external perspective with no prior knowledge of the software

41
New cards

Gray Box Testing

analyzes the source code for the software to help design the test cases

42
New cards

White Box Testing

tests from an internal perspective with full knowledge of the software

43
New cards

Abstract Syntax Tree (AST)

the basis for software metrics and issues to be generated at a later stage

44
New cards

Control Flow Analysis

the mechanism used to step through logical conditions in the code

45
New cards

Data Flow Analysis

the mechanism used to trace data from the points of input to the points of output

46
New cards

SonarQube

open-source platform for static code analysis that can detect bugs, code smells, vulnerabilities, and hotspots in over 25 programming languages

47
New cards

Spider

identifies inputs and supplies those to the scanning components of the security tool

48
New cards

PSIRT

the team that receives, investigates, and reports security vulnerabilities

49
New cards

Phase A1

Security Assessment - the project team identifies the product risks and creates a project outline for security milestones

50
New cards

Phase A2

Architecture - examines security from perspective of business risks

51
New cards

Phase A3

Design and Development - analyze and test software to determine security and privacy issues as you make informed decisions moving forward with your software

52
New cards

Phase A4

Design and Development - build onto the proper process of security testing and continue to analyze necessities at the security level

53
New cards

Phase A5

Ship - verifies that the product complies with security policies

54
New cards

Policy Compliance Analysis

done in A5 - final review of security and compliance requirements

55
New cards

Open-Source Licensing Review

done in A5 - final review of open-source software used in the stack

56
New cards

Final Security Review

done in A5 - final review of compliance against all security requirements identified during the SDL cycle - passed, passed with exceptions, not passed and requires escalation

57
New cards

Final Privacy Review

done in A5 - final review of compliance against all privacy requirements identified during the SDL cycle

58
New cards

Customer Engagement Framework

defines the process for sharing security-related information with customers

59
New cards

PRSA1

External Vulnerability Disclosure Response - stakeholders are clearly identified and a RACI matrix should be created

60
New cards

PRSA2

Third-Party Security Reviews - security assessment performed by groups other than internal testing teams

61
New cards

PRSA3

Post-Release Certifications - certifications from external parties to demonstrate the security posture of products or services

62
New cards

PRSA4 & PRSA5

Security Strategy for Legacy Code, M&A, and EOL Plans - strategy to mitigate security risk from legacy code and M&As

63
New cards

Governance (OpenSAMM function)

centered on how organizations manage overall software development activities

64
New cards

Construction (OpenSAMM function)

centered around how organizations define goals and create software within development projects

65
New cards

Verification (OpenSAMM function)

centered around how an organization checks and tests artifacts produced through software development

66
New cards

Deployment (OpenSAMM function)

centered around how an organization releases software

67
New cards

BSIMM Categories

governance, intelligence, software security development life cycle touchpoints, and deployment