27.11.2014 Views

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

Software Security Engineering - Build Security In - US-CERT

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> Analysis for System Complexity and Scale: Mitigations 5<br />

Practices in<br />

Recommended<br />

Order Description Maturity Audience<br />

Coordinate<br />

security efforts<br />

across<br />

organizational<br />

groups<br />

It is not unusual to find that<br />

an organization’s<br />

development, operational,<br />

and business groups are<br />

tackling common security<br />

problems with little<br />

coordination or that some<br />

security problems have<br />

fallen through the cracks.<br />

This separation becomes<br />

even more problematic as<br />

the scope and scale of<br />

systems expand. Vulnerability<br />

analysis and<br />

mitigations should be<br />

integrated across<br />

organization units, users,<br />

technology, systems, and<br />

operations.<br />

Relevant for<br />

These Roles<br />

L4 E, M, L • Chief information<br />

officer<br />

• Chief information<br />

security officer<br />

• System architect<br />

Thursday, November<br />

06, 2008<br />

<strong>Software</strong> <strong>Security</strong> <strong>Engineering</strong><br />

Nancy R. Mead, October 16, 2008<br />

© 2008 Carnegie Mellon University<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!