Last updated: 
3 weeks 1 day ago
Blog Manager
One of Jisc’s activities is to monitor and, where possible, influence regulatory developments that affect us and our customer universities, colleges and schools as operators of large computer networks. Since Janet and its customer networks are classified by Ofcom as private networks, postings here are likely to concentrate on the regulation of those networks. Postings here are, to the best of our knowledge, accurate on the date they are made, but may well become out of date or unreliable at unpredictable times thereafter. Before taking action that may have legal consequences, you should talk to your own lawyers. NEW: To help navigate the many posts on the General Data Protection Regulation, I've classified them as most relevant to developing a GDPR compliance process, GDPR's effect on specific topics, or how the GDPR is being developed. Or you can just use my free GDPR project plan.

Group administrators:

Incorporating security into development processes

Thursday, January 29, 2015 - 09:32

Tilmann Haak's presentation at this week's TF-CSIRT/FIRST meeting was on incorporating security requirements into software development processes using agile methods, but his key points seem relevant to any style of software or system development:

  • Make sure security features are treated as first-class user requirement, of equal status with the functional requirements provided by others. We've all experienced products where security was clearly added afterwards; in agile if it doesn't offer value to the customer then it won't get added at all. So be prepared to explain the value that security brings to the customer.
  • Do that in terms the developers are used to working with. In agile that often means user stories, so alongside Tilmann's "As a user I would like to buy candy from the machine" you need to place my "As a thief I would like to take the money that others have put in the machine".
  • Provide developers with the tools they need to implement your requirements in their systems. Don’t just say "encrypt passwords in transmission and storage" – show them the libraries and implementation guidance that will enable them to do it right. Badly implemented security really is a waste of time, delivering no value to the customer.

Comments

"Badly implemented security really is a waste of time, delivering no value to the customer."

It's worse than that: badly implemented security can deliver a wholly misleading understanding of the risk to the system in question, potentially putting the customer at greater (or indeed an unexpected) risk than they would have been had nothing been done...

Good point, thanks: thinking you've done what's needed when you haven't isn't a good place to be