<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Secure Software Development Frameworks/Methodologies in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/17978#M807</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to develop hack-resilient software, it is important to incorporate security concepts in the requirements, design, code, release and disposal phases of the SDLC. Security concepts span across the entire life cycle and will need to be addressed in each phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft has created a strategy that is referred as the SD3+C, this stands for Secure by Design, Secure by Default, secure by Deployment and communication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no single framework that addresses for all. The requirements will be changed from project to project.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example you can use BSIMM/SSMM during the requirement/design phase&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BSIMM is short for Building Security In Maturity Model. The BSIMM is a study of real-world software security initiatives organized so that you can determine where you stand with your software security initiative and how to evolve your efforts over time. BSIMM provides some good guidance for secure operations (such as penetration testing, software configuration, configuration management and vulnerability management) during deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat modeling Frameworks you can use during design phase&lt;/P&gt;&lt;P&gt;Open Source Security Testing Methodology Manual (OSSTMM) during testing phase&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use other NIST/ISO standards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIST Special Publication (SP 800-18) provides guidance for the development of security plans, incorporating security requirements and controls into the plan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ISO/IEC 15408 Standard and Software Security&lt;BR /&gt;ISO/IEC 21827:2008 – Systems Security Engineering Capability Maturity Model (SSE-CMM)&lt;/P&gt;&lt;P&gt;ISO/IEC 27002:2005 – Code of Practice for Information Security Management&lt;/P&gt;&lt;P&gt;Payment Card Industry Data Security Standard (PCI DSS)&lt;/P&gt;&lt;P&gt;and so forth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DevOps is also a good methodology to incorporate security&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Jan 2019 17:31:33 GMT</pubDate>
    <dc:creator>iluom</dc:creator>
    <dc:date>2019-01-16T17:31:33Z</dc:date>
    <item>
      <title>Best Secure Software Development Frameworks/Methodologies</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/17968#M806</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently doing some research into the secure systems/software development frameworks/methodologies that are currently in use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering what frameworks, if any, people in the (ISC)2 community might recommend and why they would recommend them.&amp;nbsp;I would greatly appreciate any useful insights the community could share with me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Darin&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 08:03:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/17968#M806</guid>
      <dc:creator>darinmorris</dc:creator>
      <dc:date>2019-01-16T08:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best Secure Software Development Frameworks/Methodologies</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/17978#M807</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to develop hack-resilient software, it is important to incorporate security concepts in the requirements, design, code, release and disposal phases of the SDLC. Security concepts span across the entire life cycle and will need to be addressed in each phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft has created a strategy that is referred as the SD3+C, this stands for Secure by Design, Secure by Default, secure by Deployment and communication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no single framework that addresses for all. The requirements will be changed from project to project.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example you can use BSIMM/SSMM during the requirement/design phase&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BSIMM is short for Building Security In Maturity Model. The BSIMM is a study of real-world software security initiatives organized so that you can determine where you stand with your software security initiative and how to evolve your efforts over time. BSIMM provides some good guidance for secure operations (such as penetration testing, software configuration, configuration management and vulnerability management) during deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat modeling Frameworks you can use during design phase&lt;/P&gt;&lt;P&gt;Open Source Security Testing Methodology Manual (OSSTMM) during testing phase&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use other NIST/ISO standards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIST Special Publication (SP 800-18) provides guidance for the development of security plans, incorporating security requirements and controls into the plan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ISO/IEC 15408 Standard and Software Security&lt;BR /&gt;ISO/IEC 21827:2008 – Systems Security Engineering Capability Maturity Model (SSE-CMM)&lt;/P&gt;&lt;P&gt;ISO/IEC 27002:2005 – Code of Practice for Information Security Management&lt;/P&gt;&lt;P&gt;Payment Card Industry Data Security Standard (PCI DSS)&lt;/P&gt;&lt;P&gt;and so forth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DevOps is also a good methodology to incorporate security&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 17:31:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/17978#M807</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-01-16T17:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Best Secure Software Development Frameworks/Methodologies</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/18132#M828</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Mouli,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for sharing your insight. It's much appreciated!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm aware of almost all of the frameworks/methodologies you've mentioned here.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;It's good to see I'm on the right track! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Darin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 07:08:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/18132#M828</guid>
      <dc:creator>darinmorris</dc:creator>
      <dc:date>2019-01-23T07:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Best Secure Software Development Frameworks/Methodologies</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/18210#M831</link>
      <description>&lt;P&gt;Hello Darin !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You might also gaze on the&amp;nbsp;OWASP Secure Software Development Lifecycle Project (&lt;A href="https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project" target="_blank"&gt;https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There you´ll find a solid security software methodology for web applications as well as tools and guidelines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Leandro&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:40:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Secure-Software-Development-Frameworks-Methodologies/m-p/18210#M831</guid>
      <dc:creator>lcinti</dc:creator>
      <dc:date>2019-01-24T14:40:32Z</dc:date>
    </item>
  </channel>
</rss>

