You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

PhasesRequirementsRelease 1
RequirementsDetermine if the project is subject to SDL policyX

Identify security advisor and security championX

Define security bug barX

Bug tracking tool must have Security Bug Effect field and Security Bug Cause fieldX

Security and privacy risk assessmentX

Write Security plan document
DesignSecurity design reviewX

Threat modelingX

Follow cryptograph requirementsX

Write security architecture document

Minimize default attack surface

Enable least privilege

Default secure

Consider a defense-in-depth approach

Examine past vulnerabilities in previous version of the project

Deprecate outdated functionality

Conduct a security review of source code

Ensure appropriate logging

Hardware security design review

Enforce strong log-out and session management

Follow NEAT security user experience guidance

Improve security-related prompts
ImplementationEstablish and follow best practicesX

Run static analysis toolX
VerificationDynamic analysisX

Fuzz testing (File parsing, RPC, network)X

Kernel-model driver testX

Risk and attack surface review

Cross-site scripting testingX

Penetration test

Binary analysis

Vulnerability regression test

Data flow test

Reply test

Input validation test

Privacy test

Secure code review

Security push
ReleaseIncident and response planX

Review and update the privacy companion formX

Complete the privacy disclosureX

Final security and privacy reviewX

Patch deployment toolsX
  • No labels