Discussions, not just bug submissions • Detailed meetings to discuss findings from offensive testing
22
Rotating work assignments and embedded liaisons
23
Setting expectations for stakeholders
24
Using organizational policy to create a need
25
Using compliance to create a need
26
The development style guide and standard libs
27
Style guides
28
Automated code scanning vs Manual reviews
29
Checklists set and track expectations
30
Conclusion
31
This talk is based on my O'REILLY repart available through Safari Books Online
Description:
Explore the intricacies of secure software development in this comprehensive ShowMeCon 2018 conference talk. Delve into the current state of software development lifecycles and learn how to identify, address, and manage security vulnerabilities throughout the process. Gain insights on understanding stakeholders, analyzing existing processes, and conducting gap analyses. Discover the importance of key program metrics, phased goals, and management support in rebuilding secure development programs. Learn strategies for effective collaboration, including rotating work assignments and embedded liaisons. Understand how to leverage organizational policies and compliance requirements to create a need for security measures. Examine the role of style guides, automated code scanning, and manual reviews in maintaining secure coding practices. Based on the speaker's O'Reilly report, this talk provides valuable knowledge for improving the security of software development lifecycles.
The Insecure Software Development Lifecycle - How to Find, Fix, and Manage