Secure Coding mailing list archives

Re: The Organic Secure SDLC


From: Paco Hope <Paco () cigital com>
Date: Tue, 19 Jul 2011 10:09:45 -0400


To clarify further, this is not meant to be prescriptive or even a set
of best
practices. It's simple observation on how many organizations tend to
evolve if
secure SDLC is not a major priority. I can't say it's based on hard data
but we
have compiled the steps from experiences at several clients and
validated it with
several others.

That is exactly the process we followed with the BSIMM. Some of the BSIMM
participants were well-established, highly capable, and mature. Others,
however, were just getting their security initiatives off the ground. We
didn't cherry-pick the best of the world. We went to firms that were
significant and found out what they were doing.

If you were seeking advice on how to build security into the SDLC from
the ground
up or looking for a set of activities to perform, you'd be better served
by looking
at BSIMM.

I don't think someone starting from the ground up looks at the BSIMM. If
you do, it's a brainstorming exercise to acquaint yourself with terms and
activities. If you want something prescriptive, Cigital's touchpoints, or
Microsoft's SDL are methodologies that tell you what to do. Think of the
BSIMM like a thermometer. It can tell you the temperature of your SDLC.
What it can't tell you is whether that's the right temperature or not. If
you're making ice cream or if you're making waffles, you have different
temperature needs. BSIMM simply tells you how you're doing right now. (And
over time if you take repeated measurements).

The organic secure SDLC misses things, like threat modeling, because in
our
observations they don't seem to be done consistently.

I think this "organic SDLC" is mis-named. It is not a software development
lifecycle. It is, if anything, a description of how security awareness
evolves at some organisations. That is, minimally aware people take the
first step of pen testing production systems. As they grow additionally
more aware, they start looking earlier and earlier in the lifecycle. This
thing itself is not a lifecycle. It's an observation about some
organisations and how they gradually awaken to the need for security in
the SDLC.

It is entirely possible that "climbing the wall" might happen as the
result of taking a measurement using the BSIMM. Instead of a linear arrow,
I wonder if you want to have time on the X axis and level of effort on the
Y axis. There's a curve here and "climb the wall" is a point in the curve
where the effort is high.

Anyways, this is just "the order that some firms seem to adopt activities
in their lifecycles." It is not a lifecycle.

Paco


_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________


Current thread: