Anurag, this shouldn't be the standard. You shouldn't be prescribing this as a set of activities when you're planning a secure SDLC. BSIMM or vBISMM or SDL or Open SAMM are all better choices.
On Mon, Jul 18, 2011 at 8:35 PM, Anurag Agarwal <anurag.agar...@yahoo.com>wrote: > Gary - So my next question is, can we come up with something like BSIMM > lite, which small or medium size companies with limited resources can use? > Or maybe pluggable modules, which different companies can pick and choose > depending on the time and resources they can allocate to it? > > My thought process is since we have a comprehensive list of activities > outlined in BSIMM, we should be able to utilize them unless it is something > which won't work across various types of organizations or dev teams with > limited resources or other such variables. > > What Rohit has outlined in his post is a very small subset of activities in > a secure SDLC methodology. Agreed, most of the companies are allocating > resources in those activities but that should not be the standard. > Activities like static code analysis or vulnerability assessment should be > used to validate threat mitigation and not a source of identifying them, > since it gives them a false sense of security. The other key element I > think > which is required now is the measurement criteria to generate metrics. (I > don't remember exactly what level of metrics criterias are defined in > BSIMM) > but they are a must for a company to assess if they are maturing in their > process or not otherwise most of the time it ends up being an academic > exercise and gets bypassed as the deadlines gets near. > > Thoughts? > > Thanks, > > Anurag Agarwal > MyAppSecurity Inc > Cell - 919-244-0803 > Email - anu...@myappsecurity.com > Website - http://www.myappsecurity.com > Blog - http://myappsecurity.blogspot.com > LinkedIn - http://www.linkedin.com/in/myappsecurity > > > -----Original Message----- > From: Gary McGraw [mailto:g...@cigital.com] > Sent: Monday, July 18, 2011 6:40 PM > To: Anurag Agarwal; 'Rohit Sethi'; Secure Code Mailing List > Subject: Re: [SC-L] The Organic Secure SDLC > > hi anurag, > > The main difference is it is a prescriptive model based on experience > (opinion?). The BSIMM is a descriptive model based on observation of over > 40 firms. Stay tuned for BSIMM3 in September-ish. > > gem > > p.s. See Cargo Cult Computer > Security<http://www.informit.com/articles/article.aspx?p=1562220> (January > 28, 2010) for more on prescriptive versus descriptive models. > > From: Anurag Agarwal > <anurag.agar...@yahoo.com<mailto:anurag.agar...@yahoo.com>> > Date: Mon, 18 Jul 2011 15:48:50 -0400 > To: 'Rohit Sethi' <rkli...@gmail.com<mailto:rkli...@gmail.com>>, Secure > Code > Mailing List <SC-L@securecoding.org<mailto:SC-L@securecoding.org>> > Subject: Re: [SC-L] The Organic Secure SDLC > > Rohit - How is this different from BSIMM? > > Thanks, > > Anurag Agarwal > MyAppSecurity Inc > Cell - 919-244-0803 > Email - anu...@myappsecurity.com<mailto:anu...@myappsecurity.com> > Website - http://www.myappsecurity.com > Blog - http://myappsecurity.blogspot.com > LinkedIn - http://www.linkedin.com/in/myappsecurity > > From: sc-l-boun...@securecoding.org<mailto:sc-l-boun...@securecoding.org> > [mailto:sc-l-boun...@securecoding.org] On Behalf Of Rohit Sethi > Sent: Monday, July 18, 2011 2:45 PM > To: Secure Code Mailing List > Subject: [SC-L] The Organic Secure SDLC > > Hi all, > > Over the years we've had the opportunity to see the evolution of security > in > software development life cycles (SDLC) at many organizations. We've > started > to see patterns in how things evolve from a path of least resistance: from > the bare minimum of production penetration testing through to security in > requirements & QA. > > In order to help us assess where an organization stands in terms of > application security maturity, we developed the Organic Secure SDLC model: > > http://www.sdelements.com/secure-sdlc/software-security-throughout-life-cycl > e-9-steps/ > > If you're an actual practitioner who has lived through developing a secure > SDLC I'd love to hear your thoughts about the model's accuracy / relevancy. > > If you know of any practical whitepapers / articles that might be of use to > somebody responsible for moving to the next in this model then please let > me > know. > > Cheers, > > -- > Rohit Sethi > SD Elements > http://www.sdelements.com > twitter: rksethi > > -- Rohit Sethi SD Elements http://www.sdelements.com twitter: rksethi
_______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________