handling of security requirements in software … › karlsruhe › 2017 › sites...handling of...

Post on 28-Jun-2020

3 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

HANDLING OF SECURITYREQUIREMENTS IN SOFTWARE

DEVELOPMENT LIFECYCLEDANIEL KEFER, RENÉ REUTER

@DKEFER

@_ARES_SEC

 

 

 

 

 

 

ISSUES

REPEATING MISTAKES

SECURITY DOCUMENTATION

SECURITY BEHIND DEV PROCESSES ANDTOOLING

 

 

 

 

 

 

APPROACH

ALIGN THE PROCESS

SCALE

KISS

SECURITYRAT

USE CASESNew assets

Production assets

 

 

 

 

 

 

DEMO

 

 

 

 

 

 

INTERNALS

Based on JHipster

Requirement Skeletons

Optional Columns

Alternatives to Option Columns

Status Columns

Implementation Type

Collections

Tags

AUTHENTICATIONOwn authentication scheme

CAS (Central Authentication Service)

ROLESFrontend User

User

Admin

JIRA INTEGRATIONCross Origin Request Sharing

SecurityRAT inherits user‘s rights in JIRA

 

 

 

SECURITYCAT

 

 

 

 

 

 

 

 

FUTURE PLANS

SECURITYRAT 2.0https://github.com/SecurityRAT/SecurityRAT/wiki/Version-

2.0-Brainstorming

COMMUNITYIssues

Pull requests

Derived projects

THANK YOU FOR YOUR ATTENTION!https://securityrat.github.io

dan.kefer@gmail.com

reuter.rene@gmail.com

top related