27.11.2014 Views

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Security</strong> Analysis for System Complexity and Scale: Mitigations 2<br />

Practices in<br />

Recommended<br />

Order Description Maturity Audience<br />

Conduct end-toend<br />

analysis of<br />

cross-system work<br />

processes<br />

With increasing complex-ity,<br />

vulnerability analysis of<br />

individual systems is not<br />

sufficient. The security<br />

analysis of work process-es<br />

that cross multiple systems<br />

has to consider the risks for<br />

those pro-cesses (including<br />

end-to-end analysis) as well<br />

as the risks that each work<br />

process creates for the<br />

systems that support it.<br />

<strong>Security</strong> analysis has to<br />

consider a wider spectrum of<br />

errors.<br />

Relevant for<br />

These Roles<br />

L3 M, L • System architect<br />

• <strong>Security</strong> analyst<br />

Thursday, November<br />

06, 2008<br />

<strong>Software</strong> <strong>Security</strong> <strong>Engineering</strong><br />

Nancy R. Mead, October 16, 2008<br />

© 2008 Carnegie Mellon University<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!