Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1456659.1456667acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Guidelines for secure software development

Published: 06 October 2008 Publication History

Abstract

It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Information security has therefore become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. The aim of this paper is to provide guidance to software designers and developers by defining a set of guidelines for secure software development. The guidelines established are based on various internationally recognised standards and best practices and some of the processes developed by many key role players.

References

[1]
Jurjens, J. 2002. Using UMLSec and goal trees for secure systems development. Communications of the ACM, 48 (5), pp.1026--1030.
[2]
Killmeyer, J. 2006. Information security architecture: An integrated approach to security in the organisation. New York: United States of America: Auerbach Publications.
[3]
Peltier, T. R. 2005. Information security risk analysis. New York: United States of America: Auerbach Publications.
[4]
Jones, R. L. and Rastogi, A. 2004. Secure coding - building security into the software development life cycle. Application Program Security, pp.29--38.
[5]
ISO. 2005. ISO/IEC 27002: Information Technology - Code of Practice for Information Security Management.
[6]
ISO. 2004. ISO/IEC 13335-1: Information Technology - Security Techniques - Management of Information and Communications Technology Security. Part 1: Concepts and models for information and communications technology security management.
[7]
ISO. 1998. ISO/IEC TR 13335-3: Information Technology - Guidelines for the Management of IT Security. Part 3: Techniques for the management of IT security.
[8]
ISO. 2000. ISO/IEC TR 13335-4: Information Technology -- Guidelines for the Management of IT Security. Part 4: Selection of safeguards.
[9]
NIST. 1996. Generally Accepted Principles and Practices for Securing Information Technology systems. NIST SP 800-14. (http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf).
[10]
NIST. 2004. Security Considerations in the Information System Development Life Cycle. NIST Special Publication 800--64. (http://csrc.nist.gov/publications/nistpubs/800-64/NIST-SP800--64.pdf).
[11]
NIST. 2002. Risk Management Guide for Information Technology Systems. NIST Special Publication 800--30. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/NIST-SP800-30.pdf on 20th June 2008.
[12]
Bertine, H., Chadwick, D., Euchner, M. And Harrop, M. 2004. Security in telecommunications and information technology (Technical Report). International Telecommunication Union.
[13]
ISO. 1989. ISO 7498-2: Information Processing Systems - Open System Interconnection - Basic Reference Model - Part 2: Security Architecture.
[14]
ISO. ISO/IEC 12207. 2004. Software Lifecycle Processes.
[15]
Peters, J. F. and Pedrycz, W. 2000. Software engineering: an engineering approach. Wiley.
[16]
Common Criteria. 2005. Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. Retrieved from http://commoncriteriaportal.org/thecc.html on 20th June 2008.
[17]
Davis, N. 2006. Secure Software Development Life Cycle Processes. Retrieved from https://buildsecurityin.uscert.gov/daisy/bsi/articles/knowledge/sdlc/326.BSI.ht ml.
[18]
IBM. Rational Unified Process Best Practices for Software Development Teams. Retrieved from http://www.128.ibm.com/developerworks/rational/library/253.html on 20th June 2008.
[19]
Lipner, S. and Howard, M. 2005. The Trustworthy Computing Security Development Lifecycle. Retrieved from http://msdn.microsoft.com/enus/library/ms995349.aspx on 20th June 2008.
[20]
OWASP. CLASP Concepts. Retrieved from http://www.owasp.org/ on 20th June 2008.
[21]
Davis, N. 2008. Developing Secure Software with TSP-Secure. Retrieved from https://buildsecurityin.uscert.gov/swa/downloads/TSP_Secure_Davis.pdf on 20th June 2008.
[22]
Howard, M. and Leblanc, D. 2003. Writing secure code: Practical strategies and techniques for secure application coding in a networked world. Microsoft Press.
[23]
Dustin, E. 2006. The Secure Software Development Lifecycle. Retrieved from http://www.devsource.com/c/a/techniques/The-Secure-Software-Development-Lifecycle/ on 12th June 2008.
[24]
Aprville, A. And Pourzandi, M. 2005. Secure Software Development by Example. IEEE Security and Privacy. Retrieved from http://www.computer.org/portal/site/security on 20th June 2008.
[25]
Rajlich, V. 2006, August. Changing the paradigm of software engineering. Communications of the ACM, 49 (8), pp.67--70.
[26]
Procaccino, J. D., Verner, J. M. and Lorenzet, S. J. 2006. Defining and contributing to software development success. Communications of the ACM, 49 (8), pp.79--83.
[27]
Breu, R., Burger, K., Hafner, M. and Popp, G. 2004. Towards a systematic development of secure systems. Systematic Development, pp.5--13.

Cited By

View all
  • (2022)MetaSEnD: A Security Enabled Development Life Cycle Meta-ModelProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544463(1-10)Online publication date: 23-Aug-2022
  • (2021)YAZILIM GELİŞTİRME SÜRECİNDE DEĞER ODAKLI İYİLEŞTİRMEVALUE ORIENTED IMPROVEMENT FOR SOFTWARE DEVELOPMENT PROCESSEndüstri Mühendisliği10.46465/endustrimuhendisligi.80943832:1(90-107)Online publication date: 30-Apr-2021
  • (2021)Repack Me If You Can: An Anti-Repackaging Solution Based on Android VirtualizationProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3488021(970-981)Online publication date: 6-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SAICSIT '08: Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
October 2008
304 pages
ISBN:9781605582863
DOI:10.1145/1456659
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Microsoft: Microsoft

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. secure software development
  2. security standards and best practices
  3. software development lifecycle (SDLC)

Qualifiers

  • Research-article

Conference

SAICSIT '08
Sponsor:
  • Microsoft

Acceptance Rates

Overall Acceptance Rate 187 of 439 submissions, 43%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)94
  • Downloads (Last 6 weeks)11
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)MetaSEnD: A Security Enabled Development Life Cycle Meta-ModelProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544463(1-10)Online publication date: 23-Aug-2022
  • (2021)YAZILIM GELİŞTİRME SÜRECİNDE DEĞER ODAKLI İYİLEŞTİRMEVALUE ORIENTED IMPROVEMENT FOR SOFTWARE DEVELOPMENT PROCESSEndüstri Mühendisliği10.46465/endustrimuhendisligi.80943832:1(90-107)Online publication date: 30-Apr-2021
  • (2021)Repack Me If You Can: An Anti-Repackaging Solution Based on Android VirtualizationProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3488021(970-981)Online publication date: 6-Dec-2021
  • (2021)Integrating Web Application Security Penetration Testing into the Software Development Life Cycle: A Systematic Literature Review2021 International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI53623.2021.9655950(671-676)Online publication date: 25-Oct-2021
  • (2020)Sensei: Enforcing secure coding guidelines in the integrated development environmentSoftware: Practice and Experience10.1002/spe.284450:9(1682-1718)Online publication date: 4-Jun-2020
  • (2019)SECURE SOFTWARE DEVELOPING RECOMMENDATIONSCybersecurity: Education, Science, Technique10.28925/2663-4023.2019.6.82932:6(82-93)Online publication date: 2019
  • (2019)Secure Software Developing Recommendations2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)10.1109/PICST47496.2019.9061529(45-50)Online publication date: Oct-2019
  • (2019)Managing the Secure Software Development2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)10.1109/NTMS.2019.8763845(1-4)Online publication date: Jun-2019
  • (2019)Developing Battery of Vulnerability Tests for Industrial Control Systems2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)10.1109/NTMS.2019.8763810(1-5)Online publication date: Jun-2019
  • (2019)When Software Engineering meets Cybersecurity at the classroom2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT)10.1109/CONISOFT.2019.00017(49-54)Online publication date: Oct-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media