You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

PhasesRequirementsRelease 1
RequirementsDetermine if the project is subject to SDL policyX

Identify security advisor and security championX

Define security bug barX

Bug tracking tool must have Security Bug Effect field and Security Bug Cause fieldX

Security and privacy risk assessmentX

Write Security plan document
DesignSecurity design reviewX

Threat modelingX

Follow cryptograph requirementsX

Write security architecture document

Minimize default attack surface

Enable least privilege

Default secure

Consider a defense-in-depth approach

Examine past vulnerabilities in previous version of the project

Deprecate outdated functionality

Conduct a security review of source code

Ensure appropriate logging

Hardware security design review

Enforce strong log-out and session management

Follow NEAT security user experience guidance

Improve security-related prompts
ImplementationEstablish and follow best practicesX

Run static analysis toolX
VerificationDynamic analysis

Fuzz testing

Kernel-model driver test

Risk and attack surface review




Penetration test






ReleaseIncident and response plan

Final security review

Release & Archive

Patch deployment tools


  • No labels