Partager via


A New Book: The Security Development Lifecycle (Microsoft Press, 2006)

Much to my wife’s chagrin but to my delight I have just completed another book, this time with my boss, Steve Lipner. It’s a bit of a departure for me, as my prior books have been totally developer-centric. But that doesn’t mean I’m any less excited to do it; in fact, I think this book is more important than Writing Secure Code.

This time the book documents the Security Development Lifecycle (SDL), a process  that we’ve made part of the software development process here at Microsoft to build more secure software. Many customers, press, analysts, and, to be honest, competitors want to know more about what we’re doing in the software engineering space to shore up our software’s defenses. And thanks to the SDL, we’ve seen good progress to date (read: in the range of 50% reduction in vulnerabilities, sometimes more!)

In my opinion, what sets this book apart is the fact that it’s based on real-world software engineering, not theory, and is written by two guys whose job it is to work every day with software engineers and management to help them ship more secure software. We know what works and we know what doesn’t work. In fact, many people ask me, “If you had to choose two things from the SDL, what would they be?” and my answer is always the same, “Everything, because if it doesn’t work, it’s wouldn’t be in SDL!”

The Table of Contents for the book is:

Part I The Need for the SDL 
Chapter 1 Enough Is Enough: The Threats Have Changed
Chapter 2 Current Software Development Methods Fail
  to Produce Secure Software 
Chapter 3 A Short History of the SDL at Microsoft 
Chapter 4 SDL for Management 

Part II The Security Development Lifecycle Process  
Chapter 5 Stage 0: Education and Awareness 
Chapter 6 Stage 1: Project Inception 
Chapter 7 Stage 2: Define and Follow Design Best Practices 
Chapter 8 Stage 3: Product Risk Assessment 
Chapter 9 Stage 4: Risk Analysis 
Chapter 10 Stage 5: Creating Security Documents, Tools,
  and Best Practices for Customers 
Chapter 11 Stage 6: Secure Coding Policies 
Chapter 12 Stage 7: Secure Testing Policies 
Chapter 13  Stage 8: The Security Push 
Chapter 14 Stage 9: The Final Security Review 
Chapter 15 Stage 10: Security Response Planning 
Chapter 16 Stage 11: Product Release 
Chapter 17 Stage 12: Security Response Execution
 
Part III SDL Reference Material  
Chapter 18 Integrating SDL with Agile Methods  
Chapter 19 SDL Banned Function Calls  
Chapter 20 SDL Minimum Cryptographic Standards  
Chapter 21 SDL-Required Tools and Compiler Options 
Chapter 22 Threat Tree Patterns 

We kept the book short (352 pages) to focus on the core elements of the SDL, rather than blathering on. All the chapters are useful, but I think the most interesting chapters are these:

  • Ch 1 Really spells out the need for security (and it has nothing to do with security!)
  • Ch 3 Steve did a wonderful job of outlining the history of the SDL at Microsoft. It’s a real eye-opener and a very candid look into the security issues we, and the industry, face.
  • Ch 4 What managers need to know about implementing SDL, in terms of benefit and cost.
  • Ch 9 This is a highly updated and streamlined (and more pragmatic) look at our threat modeling and risk analysis framework, and it includes a real-world fully worked example.
  • Ch 12 This chapter introduces many security testing techniques, including fuzz-testing, and the book includes the source code for a file fuzzer.
  • Ch 15 Another Steve-chapter, this is an exposé of the Microsoft security response process. Again, it’s very candid, outlining many of the lessons we have learned building the best response process.
  • Ch 18 There has been zero security guidance for Agile methods, until now. This chapter was written in conjunction with the MSN and Windows Live team.
  • Ch 22 When we started threat modeling, we asked development teams to build threat trees. It turns out that unless you know what you’re doing, you will never build good threat trees. Then we realized that there are threat tree patterns that apply to the various threat types. This chapter outlines all the threat trees and how you can use them to design and test your application.

The book includes a CD that includes a six-part video presentation of the “Security Basics” class we deliver to all new employees here.

Steve and I are really excited about this book, in part because today is the day we sign off on it! The galleys are all reviewed and the cover looks great.

But we’re mostly excited because we believe this in an important book—the first book to document REAL software development process improvements that yield more secure software. It ain’t perfect, and that’s why we update the SDL twice a year, but it’s a great start.

The book will be available in June this year. You can find more info here https://www.microsoft.com/MSPress/books/8753.asp.

Comments

  • Anonymous
    April 28, 2006
    For those of you that haven't seen it yet, Mike Howard and Steve Lipner have published a new book, The...

  • Anonymous
    April 28, 2006
    How's Designing Secure Software coming along? Amazon lists it coming out on December 1, 2006.

  • Anonymous
    May 08, 2006
    I'm really pleased to let you know that Michael Howard and Steve Lipner (both Microsoft security experts)...

  • Anonymous
    May 28, 2006
    Michael Howard has written another book dealing with Security. This time it goes into detail about the...

  • Anonymous
    June 16, 2006
    I bought Michael Howard's and Steve Lipner's book The Security Development Lifecycle here at TechEd 2006...

  • Anonymous
    June 07, 2009
    PingBack from http://besteyecreamsite.info/story.php?id=1174

  • Anonymous
    June 16, 2009
    PingBack from http://topalternativedating.info/story.php?id=14185