Design Shutters - Part 1

Design Shutters - Part 1


Design Shutters – Part 1

?

The design of software application should entail cybersecurity considerations. Like the patterns defined for describing “Elements of Reusable Object Oriented Software” (see [1]), there are reusable practices that could constitute valid obstacles for the attackers.

?


?

Framework

These elements could be arranged in a practical framework:?

There are 4 layers of practices to be put in place:

?Cybersecurity: considerations about people (attackers), company (business and organization) and evaluation of possible damages.

?Weaknesses: issues about vulnerabilities and misconfigurations of adopted libraries, middleware and environments.

?Architectures: integration with functional components external to the application.

?Coding: usual errors to avoid: BOF (Buffer OverFlow), UAF (Use After Free) and Input Validation.

?

Activities

Each layer owns 5 types of activities to undertake for ensuring the activations of shutters in front of the attackers, as below:?

·Know (6 elements): know the cases with which to manage the layer.

?Reduce (5 elements): areas of intervention in the layer.

?Evaluate (3 elements): risk assessment in the layer.

?Execute (4 elements): risk management options.

?Process (2 elements): corresponding processes in DevOps (or DevSecOps).

+ proper KPIs, for instructing proper Governance.

?

That leads to 21 elements, as the first version of “Design Patterns” and as in the [2]

?

References

?

[1]

“Design Patterns: Elements of Reusable Object-Oriented Software”, March 14th, 1995

by ?Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides

[2]

“Il Sistema Periodico”, 1975, by Primo Levi

?

要查看或添加评论,请登录

Paolo OTTOLINO的更多文章

  • Using 8 Scrum (Ba-Gua) items to become more Agile

    Using 8 Scrum (Ba-Gua) items to become more Agile

    Essential Scrum is composed by 8 item rules (like Ba Gua). Agile Enterprise approaches as the 8 following rules: (Zhen)…

  • Euro area adjustment for Banking

    Euro area adjustment for Banking

    " Constitutions tend to show a strong socialist influence, reflecting the political strength that left wing parties…

  • The Need for Riding Disruptive Innovation

    The Need for Riding Disruptive Innovation

    New Technology market is fastly running, providing new devices and destroying previous ones. That is, the strict…

  • Getting More - Negotiation

    Getting More - Negotiation

    Getting More, non getting All. It is a methodology for negotiating from Stuart Diamond.

  • No more Tenders by Maximum Cost Saving

    No more Tenders by Maximum Cost Saving

    On Feb 26th, 2016 the new Directive 2014/24/EU about Tenders was issued (see https://www.ediltecnico.

  • FoIA in EU… and Italy?

    FoIA in EU… and Italy?

    The European project is founded on “Four Freedoms” detailed in the Treaty on the Functioning of the European Union, in…

  • NIS Directive from EU

    NIS Directive from EU

    The “Network and Information Security Directive” was firstly proposed on February 7th, 2013 (see…

  • APJ Abdul Kalam quotes

    APJ Abdul Kalam quotes

    Success Failure will never overtake a person whose determination to succed is strong enough Man needs difficulties in…

  • Agile Risk: DevOps to Security

    Agile Risk: DevOps to Security

    Traditional Risk Analysis are anachronistic. In fact, despite the aim of deepness and accuracy, these are late, not…

    5 条评论
  • BIA for Dummies

    BIA for Dummies

    Business impact analysis (BIA) is a systematic process to evaluate or design the needed countermeasures to put in…

社区洞察

其他会员也浏览了