{"id":76,"date":"2018-12-25T17:58:52","date_gmt":"2018-12-25T17:58:52","guid":{"rendered":"http:\/\/www.davincivirus.com\/?p=76"},"modified":"2021-11-14T22:57:11","modified_gmt":"2021-11-14T22:57:11","slug":"sdlc-security-foundation","status":"publish","type":"post","link":"https:\/\/www.davincivirus.com\/?p=76","title":{"rendered":"SDLC Security Foundation"},"content":{"rendered":"\n<h3>Early, often, &amp; coupled with training<br><\/h3>\n\n\n\n<p>Each system development effort has a unique set of challenges that can instigate deviation from software assurance best practices. &nbsp;It is the role of engineering professionals to highlight these deficiencies and be staunch proponents of security during the earlier stages of the SDLC. &nbsp;It is this early involvement that ultimately solidifies the foundation upon which secure system development can occur.  Contrastingly, focusing on security solely in the latter stages of development can be likened to pouring foundation near the end of a construction project; you\u2019re setting yourself up for failure.<br><\/p>\n\n\n\n<p>A 2010 IBM study provides clear fiscal justification for the prioritization of early intervention. &nbsp;Their study concludes that remediating security issues was 15-100 times less expensive during development and design. <strong><\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" src=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/chart-defectFixingCosts.jpg\" alt=\"\" class=\"wp-image-77\" width=\"307\" height=\"167\" srcset=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/chart-defectFixingCosts.jpg 709w, https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/chart-defectFixingCosts-300x163.jpg 300w\" sizes=\"(max-width: 307px) 100vw, 307px\" \/><figcaption> <br><strong>[Source: https:\/\/www.synopsys.com\/blogs\/software-security\/cost-to-fix-bugs-during-each-sdlc-phase\/]<\/strong><br><\/figcaption><\/figure><\/div>\n\n\n\n<p>If we all know early involvement is pivotal, then why do we keep making the same mistakes? &nbsp;Two factors fuel this repetitiously bad behavior.  First &#8211; large scale development efforts often grow from of niche prototypes. &nbsp;Engineers can easily become laser focused on functionality in a controlled environment when creating these initial prototypes.  The resulting failure to account for external influencing factors makes the system ripe for exploitation by hackers.<br><\/p>\n\n\n\n<p>The second (arguably more common) distractor from early prioritization of security stems from expense. &nbsp;Businesses investing in software are taking a taking a hefty monetary risk; investing resources with the hope of ultimately yielding profit. &nbsp;Some of these ventures will inevitably fail.  It therefore takes a lot of gravitas for a company to risk capital early in the SDLC on features that won&#8217;t payoff until the system is fully matured and deployed. <br><\/p>\n\n\n\n<h3>Remediation &#8211; How do we change the tide?<\/h3>\n\n\n\n<p>Companies are justified in their reluctance to focus on security; namely because the manpower needed to solidify sound security processes is expensive. &nbsp;The good news is that this initial expense does dwindle over time.  To achieve executive level buy-in, these initial costs must be seen as only short term expenditures with long term positive fiscal impacts. &nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" width=\"516\" height=\"189\" src=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/SDLC-LevelOfEffort.jpg\" alt=\"\" class=\"wp-image-78\" srcset=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/SDLC-LevelOfEffort.jpg 516w, https:\/\/www.davincivirus.com\/wp-content\/uploads\/2018\/12\/SDLC-LevelOfEffort-300x110.jpg 300w\" sizes=\"(max-width: 516px) 100vw, 516px\" \/><\/figure><\/div>\n\n\n\n<p>Benefits from these investments quickly radiate to other development efforts within an organization. &nbsp;For example, a developer deeply ingrained in an SDLC that prioritizes security will learn how to design countermeasures in response to real world adviseral techniquest\/tactics. &nbsp;These defensive coding tactics are solidified early within one development effort and then seamlessly shifted to the next coding effort with no added expenditure.  It&#8217;s also feasible to assume that these skills can permeate to other business units in the organization via information sharing activities; lunch \u2018n learns and all-hands training. &nbsp;<br><\/p>\n\n\n\n<p>These benefits can however easily be lost if management falls into one of the common pitfalls. &nbsp;Well intentioned managers will sometimes spend vast sums of money to purchase \u201cstate of the art\u201d tools that bolster security; &nbsp;static\/dynamic code analysis tools alone can have starting costs exceeding $100k.  Some of these tools are truly very useful!  However, they can also encapsulate fiscal benefits within only a single SDLC. &nbsp;Over reliance upon these automated tools will likely also stifle sincere technical growth and comprehension among development teams.<br><\/p>\n\n\n\n<p>Training your development staff is therefore exponentially more beneficial than purchasing tools. Automated tools are great &#8211; but only in the hands of a development staff with the technical maturity needed to wield them. &nbsp;<br><\/p>\n\n\n\n<p>Bottom line &#8211; Companies need to invest in training. &nbsp;Developers and systems engineers are smart people diligently striving to create the best possible solution. &nbsp;Increasing their technical prowess will therefore influence their design decisions and daily development efforts.<br><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Early, often, &amp; coupled with training Each system development effort has a unique set of challenges that can instigate deviation&hellip; <a class=\"read-more\" href=\"https:\/\/www.davincivirus.com\/?p=76\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":78,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/76"}],"collection":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=76"}],"version-history":[{"count":4,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/76\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/76\/revisions\/230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/media\/78"}],"wp:attachment":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=76"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=76"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}