Development Lifecycle.pptx for the secure development of apps

cristianmanaila2 20 views 4 slides May 20, 2024
Slide 1
Slide 1 of 4
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4

About This Presentation

Development Lifecycle Security rules to follow.


Slide Content

Development Lifecycle

Security Lifecycle Plan Questionnaire     Do you practice version management for any security documents for the tools used? Do you run automatic security scans in your development lifecycle? 2.1) Do you have the latest security plugins and tools to provide security suggestions and detection to help improve secure coding? 2.2) Are security experts involved in all steps of software design and QA testing? Do you perform integrity checks on deployed artifacts to make sure the fires were not modified? Do you monitor third party libraries used in the code at a regular interval for known weaknesses and maintainability? Do you perform active checks to confirm that purchased hardware and software is as declared? Have you integrated peer secure code review into the development lifecycle? Do you perform security reviews for existing third-party integrations before incorporation? Do you perform period full whitebox penetration testing? Do you perform external attack simulations at regular intervals to check external attack detection readiness? How do you manage sensitive data when shared on company communication platforms? Do you review non-security related guidelines/protocols/ procedures for possible security loopholes?

Do you use 2FA when dealing with user management data platforms? Does each team have a cyber responsibility team member to help oversee security implementation? Do you have a mechanism or a formal procedure which allows sharing with other projects the insecure code patterns and weakness discovered in a project? Do you have a policy in place to prevent workers to connect their phones or other non-secure devices via USB ports? Do you use logical groups for important assets such as DNS domains and AWS resources to prevent having a single point of failure? Does each user have different accounts & password for different systems to prevent a single point of failure in case of breach? 17.1) Dou you use different accounts/password for staging and production environments? Do you change the KRBTGT built-in active directory user password at regular intervals? Are you enforcing the strong password policy across all machines, systems and apps? Do you try and use automation, when possible, to limit security risks? Are you employing SMB signing and Extended Protection for Authentication (EPA) and try to disable NTLM support in the domain controllers to protect yourself from various NTLM relay attacks such as the new PetitPotam attack? Do you have a DLP system or any measures to prevent data or code leakage or detect what was leaked? Do you practice application whitelisting and enforcement using a system such as Applocker ? Do you have an installation folder with allowed programs and packages to be installed which is secured using signatures and hash

validation? Do you block/forbid users to download and install arbitrary programs? Do you have periodic backup automation not only for databases, but for all sensitive data, code, configurations and documents? Do you use 2FA anti-deletion policies in AWS backups? Do you have offline backups for all sensitive data, code, configurations and documents? Do you review which servers and services are publicly accessible and block public network access to all of those which shouldn’t be publicly accessible and add IP whitelist where possible? Have you implemented a security mechanism to prevent public access to QA websites which have debug functionality? Do you practice network separation between the staging and production servers? Are you using Devops automations for all the servers, both Windows and Linux and then implementing security hardenings and configurations into the automations? Do you perform periodic review of the log management system to make sure sensitive data is not being logged? Do you have a log collection for all the systems and services?