07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

142<br />

<strong>Enterprise</strong> <strong>Library</strong> <strong>Test</strong> <strong>Guide</strong><br />

Table 30 lists the DREAD rating for threat 12.<br />

Table 30: Threat 12 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Performing Security Reviews<br />

The security reviews are the final steps in ensuring that the application block follows<br />

security best practices. The security reviews for <strong>Enterprise</strong> <strong>Library</strong> focused on the<br />

code, access considerations, and design and deployment. All of the security reviews<br />

had the following common characteristics:<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Security reviews were done on small pieces of code and reviews had multiple<br />

iterations.<br />

Security reviews were performed in a timely manner to avoid backlogs and to<br />

ensure that problems were discovered as early as possible.<br />

The security reviews were performed by more than one tester and/or developer.<br />

The reviewers were people with expertise in the pertinent areas. For example,<br />

people with experience in cryptography performed the security reviews of cryptography<br />

and secrets.<br />

Security review checklists were used to make sure that all the relevant points were<br />

covered and to serve as documentation.<br />

FXCOP was used as the analysis tool.<br />

Security Review Checklists<br />

Checklists enumerate recommendations as itemized lists. The checklists included<br />

here were used in the <strong>Enterprise</strong> <strong>Library</strong> security reviews. You can use them as models<br />

or templates. The categories of checklists are:<br />

●<br />

●<br />

●<br />

●<br />

●<br />

General code review<br />

Managed code review<br />

Resource access<br />

Code access<br />

Design and deployment<br />

General Code Review Checklist<br />

Table 31 lists the general code review recommendations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!