A1 - Security Assessment: Software security team is looped in early, Software security team hosts a discovery meeting, Software security team creates an SDL project plan, Privacy impact assessment INITIATED, A2 - Architecture: Policy compliance analysis 1, SDL policy assessment & scoping, Threat modeling analysis, Open source selection, Privacy information GATHERING and ANALYSIS, A3 - Design & Development: Policy compliance analysis 2, Security test plan composition, Static analysis 1, Threat model UPDATING, Design security analysis and review, Privacy assessment IMPLEMENTATION, A4 - Design & Development: Policy compliance analysis 3, Security test case execution, Static analysis 2, Dynamic analysis, Fuzz testing, Manual code review, Privacy VALIDATION & REMEDIATION, A5 - Ship: Policy compliance analysis 4, Final security review, Vulnerability scan, Penetration testing, Open source licensing review, Final Privacy review, Post Release Support: External vulnerability disclosure response, 3rd party reviews, Post release certifications, Internal review for new product combinations, Security architectural review,

D487 SDL Activities - 456765

Leaderboard

Visual style

Options

Switch template

Continue editing: ?