- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 218字
- 2021-06-10 18:42:33
The Secure Development Life Cycle (SDLC)
How security is handled in the development life cycle is frequently a reflection of the industry and its conventional or dictated development methodologies. Some product types, such as aircraft or cars, are simply not amenable to pure Agile development methodologies, because of the complexity and dependencies built into their supply chains, and the absolute nature of the intermediate and final delivery dates of their products.
Regardless, in many cases, development organizations do have some latitude when selecting a development methodology. This section spells out common development approaches and provides guidance on implementing security rigor within those approaches.
When selecting a development methodology, building security in from the beginning means that well-thought-out security, safety, and privacy requirements are elicited, and made traceable throughout the development and update of an IoT device or system. By system, we mean a collection of IoT devices, applications, and services that are integrated to support a business function.
Templated approaches are available that can be applied to any development effort. Microsoft's Security Development Lifecycle (https://www.microsoft.com/en-us/sdl/), for example, incorporates multiple phases: training, requirements, design, implementation, verification, release, and response.
Whichever security life cycle is chosen, it is overlaid on a preferred development approach. Popular methodologies today include waterfall, Spiral, Agile, and DevOps. We discuss each methodology here.
- Metasploit Penetration Testing Cookbook(Third Edition)
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- API安全實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全保障能力研究
- 計(jì)算機(jī)使用安全與防護(hù)
- Preventing Digital Extortion
- Learning Devise for Rails
- 安全防御入門手冊
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 信息安全工程與實(shí)踐
- 捍衛(wèi)隱私
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測試
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來