25th June, 2014
There are various threats to the Software Databases that can be addressed for building up secure software products. Some examples of these threats and vulnerabilities are: Aggregation, Bypass Attacks, Inference, Poly-instantiation, Views, Concurrency, Data Contamination, Dead-locking, Denial of service, Improper modification of data, Interception of data, Query attacks, Server access, Time of check / Time of use (TOC/TOU), Web security, Unauthorized access, etc.
With regards to the CMMI model, CMMI Institute has published a new technical note authored by Siemens AG Corporate Technology, entitled Security by Design with CMMI for Development, Version 1.3: An Application Guide for Improving Processes for Secure Products. This application guide is a set of additional process areas for CMMI® (Capability Maturity Model® Integration) for Development, Version 1.3 (CMMI-DEV, V1.3). The additional process areas–Organizational Preparedness for Secure Development, Security Management in Projects, Security Requirements and Technical Solution, and Security Verification and Validation—will seamlessly integrate into the Process Management, Project Management, and Engineering process area categories of CMMI-DEV.
Previous PostWhat are the important points to be considered for building up secure software products? What are the developments in this regard with respect to CMMI Model?
Next PostWhat is CMMI Constellation?
Rajendra Khare (MD)
DQS Certification India Private Limited
USA Phone: 703-574-4929, 703-574-4962
Rajendra's LinkedIn Profile
Rajendra is a qualified and certified Lead Appraiser and Instructor for the following :