Главная
Study mode:
on
1
Intro
2
Bill Sempf
3
Adrian
4
ASDs
5
OAuth
6
Does it provide a standard
7
The focus of this talk
8
Layered security mechanisms
9
Positive security model
10
Application should fail securely
11
Least privilege
12
Separation of duties
13
Security by obscurity
14
Input is a risk
15
How do we bake this in
16
There are four levels
17
OS vs Level 0
18
Opportunistic Level
19
Standard Level
20
Verification Requirements
21
OAuth Requirements
22
Session Management
23
Access Control
24
Cryptography
25
Error Handling Logging
26
Data Protection
27
Communication
28
HTTP Security
29
Malicious Controls
30
Business Logic
31
File Upload
32
Mobile
33
Whats next
34
Five step process
35
AB Immediate needs
Description:
Explore a comprehensive security test plan for software development in this 45-minute conference talk from BSides Columbus Ohio 2015. Learn about layered security mechanisms, positive security models, and the principle of least privilege. Discover how to implement OAuth, session management, access control, and cryptography. Examine the four levels of security testing, from OS to verification requirements. Gain insights into handling input risks, error logging, data protection, and HTTP security. Understand the importance of malicious controls, business logic, and mobile security considerations. Conclude with a five-step process for immediate implementation of security testing in your software projects.

Got Software - Need a Security Test Plan - Got You Covered

Add to list