BN.com Gift Guide

The Security Development Lifecycle: SDL - A Process for Developing Demonstrably More Secure Software

Overview

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (10) from $15.92   
  • New (4) from $76.28   
  • Used (6) from $15.92   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$76.28
Seller since 2014

Feedback rating:

(61)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
0735622140 Brand New! Fast Shipping! Free USPS Tracking Number. Excellent Customer Service!

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$76.28
Seller since 2014

Feedback rating:

(61)

Condition: New
0735622140 Brand New! Fast Shipping! Free USPS Tracking Number. Excellent Customer Service!

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$76.28
Seller since 2014

Feedback rating:

(61)

Condition: New
0735622140 Brand New! Fast Shipping! Free USPS Tracking Number. Excellent Customer Service!

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$166.67
Seller since 2008

Feedback rating:

(196)

Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.

Discover how to:

  • Use a streamlined risk-analysis process to find security design issues before code is committed
  • Apply secure-coding best practices and a proven testing process
  • Conduct a final security review before a product ships
  • Arm customers with prescriptive guidance to configure and deploy your product more securely
  • Establish a plan to respond to new security vulnerabilities
  • Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum

Includes a CD featuring:

  • A six-part security class video conducted by the authors and other Microsoft security experts
  • Sample SDL documents and fuzz testing tool

PLUS—Get book updates on the Web.

A Note Regarding the CD or DVD

The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Read More Show Less

Product Details

  • ISBN-13: 9780735622142
  • Publisher: Microsoft Press
  • Publication date: 6/28/2006
  • Series: PRO-Best Practices
  • Edition description: REV
  • Pages: 352
  • Product dimensions: 7.72 (w) x 8.90 (h) x 1.08 (d)

Meet the Author

Michael Howard, CISSP, is a leading security expert. He is a senior security program manager at Microsoft® and the coauthor of The Software Security Development Lifecycle. Michael has worked on Windows security since 1992 and now focuses on secure design, programming, and testing techniques. He is the consulting editor for the Secure Software Development Series of books by Microsoft Press.

Steve Lipner, CISSP, is the senior director of Security Engineering Strategy for Microsoft. He is responsible for defining and updating the Security Development Lifecycle and has pioneered numerous security techniques. Steve has over 35 years’ experience as a researcher, development manager, and general manager in IT security.

Read More Show Less

Table of Contents

Foreword;
Introduction;
Why Should You Read This Book?;
Organization of This Book;
The Future Evolution of the SDL;
What’s on the Companion Disc?;
System Requirements;
Acknowledgments;
References;
Part I: The Need for the SDL;
Chapter 1: Enough Is Enough: The Threats Have Changed;
Worlds of Security and Privacy Collide;
Another Factor That Influences Security: Reliability;
It’s Really About Quality;
Why Major Software Vendors Should Create More Secure Software;
Why In-House Software Developers Should Create More Secure Software;
Why Small Software Developers Should Create More Secure Software;
Summary;
References;
Chapter 2: Current Software Development Methods Fail to Produce Secure Software;
"Given enough eyeballs, all bugs are shallow";
Proprietary Software Development Methods;
Agile Development Methods;
Common Criteria;
Summary;
References;
Chapter 3: A Short History of the SDL at Microsoft;
First Steps;
New Threats, New Responses;
Windows 2000 and the Secure Windows Initiative;
Seeking Scalability: Through Windows XP;
Security Pushes and Final Security Reviews;
Formalizing the Security Development Lifecycle;
A Continuing Challenge;
References;
Chapter 4: SDL for Management;
Commitment for Success;
Managing the SDL;
Summary;
References;
Part II: The Security Development Lifecycle Process;
Chapter 5: Stage 0: Education and Awareness;
A Short History of Security Education at Microsoft;
Ongoing Education;
Types of Training Delivery;
Exercises and Labs;
Tracking Attendance and Compliance;
Measuring Knowledge;
Implementing Your Own In-House Training;
Key Success Factors and Metrics;
Summary;
References;
Chapter 6: Stage 1: Project Inception;
Determine Whether the Application Is Covered by SDL;
Assign the Security Advisor;
Build the Security Leadership Team;
Make Sure the Bug-Tracking Process Includes Security and Privacy Bug Fields;
Determine the "Bug Bar";
Summary;
References;
Chapter 7: Stage 2: Define and Follow Design Best Practices;
Common Secure-Design Principles;
Attack Surface Analysis and Attack Surface Reduction;
Summary;
References;
Chapter 8: Stage 3: Product Risk Assessment;
Security Risk Assessment;
Privacy Impact Rating;
Pulling It All Together;
Summary;
References;
Chapter 9: Stage 4: Risk Analysis;
Threat-Modeling Artifacts;
What to Model;
Building the Threat Model;
The Threat-Modeling Process;
Using a Threat Model to Aid Code Review;
Using a Threat Model to Aid Testing;
Key Success Factors and Metrics;
Summary;
References;
Chapter 10: Stage 5: Creating Security Documents, Tools, and Best Practices for Customers;
Why Documentation and Tools?;
Creating Prescriptive Security Best Practice Documentation;
Creating Tools;
Summary;
References;
Chapter 11: Stage 6: Secure Coding Policies;
Use the Latest Compiler and Supporting Tool Versions;
Use Defenses Added by the Compiler;
Use Source-Code Analysis Tools;
Do Not Use Banned Functions;
Reduce Potentially Exploitable Coding Constructs or Designs;
Use a Secure Coding Checklist;
Summary;
References;
Chapter 12: Stage 7: Secure Testing Policies;
Fuzz Testing;
Penetration Testing;
Run-Time Verification;
Reviewing and Updating Threat Models if Needed;
Reevaluating the Attack Surface of the Software;
Summary;
References;
Chapter 13: Stage 8: The Security Push;
Preparing for the Security Push;
Training;
Code Reviews;
Threat Model Updates;
Security Testing;
Attack-Surface Scrub;
Documentation Scrub;
Are We Done Yet?;
Summary;
References;
Chapter 14: Stage 9: The Final Security Review;
Product Team Coordination;
Threat Models Review;
Unfixed Security Bugs Review;
Tools-Use Validation;
After the Final Security Review Is Completed;
Summary;
Chapter 15: Stage 10: Security Response Planning;
Why Prepare to Respond?;
Preparing to Respond;
Security Response and the Development Team;
Summary;
References;
Chapter 16: Stage 11: Product Release;
References;
Chapter 17: Stage 12: Security Response Execution;
Following Your Plan;
Making It Up as You Go;
Knowing What to Skip;
Summary;
References;
Part III: SDL Reference Material;
Chapter 18: Integrating SDL with Agile Methods;
Using SDL Practices with Agile Methods;
Augmenting Agile Methods with SDL Practices;
Summary;
References;
Chapter 19: SDL Banned Function Calls;
The Banned APIs;
Why the "n" Functions Are Banned;
Important Caveat;
Choosing StrSafe vs. Safe CRT;
Using StrSafe;
Using Safe CRT;
Other Replacements;
Tools Support;
ROI and Cost Impact;
Metrics and Goals;
References;
Chapter 20: SDL Minimum Cryptographic Standards;
High-Level Cryptographic Requirements;
Cryptographic Algorithm Usage;
Data Storage and Random Number Generation;
References;
Chapter 21: SDL-Required Tools and Compiler Options;
Required Tools;
References;
Chapter 22: Threat Tree Patterns;
Spoofing an External Entity or a Process;
Tampering with a Process;
Tampering with a Data Flow;
Tampering with a Data Store;
Repudiation;
Information Disclosure of a Process;
Information Disclosure of a Data Flow;
Information Disclosure of a Data Store;
Denial of Service Against a Process;
Denial of Service Against a Data Flow;
Denial of Service Against a Data Store;
Elevation of Privilege;
References;
Appendix : Appendix;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted April 12, 2007

    It's about time!

    Great book with solid and useful content. This is a fantastic resource for people managing software projects. I'm so glad to finally see more emphasis placed on Software Security. I'm hoping to see these guys at the Secure Development World Conference 2007!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 20, 2011

    No text was provided for this review.

Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)