CSSLP Brochure ForPDF
CSSLP Brochure ForPDF
in software development.
WHAT HOLES?
No security built in, that’s the hole, the flaw and it’s huge. David Rice, esteemed
author of “Geekonomics: The Real Cost of Insecure Software”, puts the total cost
of security holes in software at around 180 billion U.S. Dollars a year.
The combined losses are so enormous, they are virtually unquantifiable. Fines
against organizations that have experienced breaches because of insecure
software alone have reached astronomical amounts. Factor in that more than
226 million records have been disclosed or breached since 2005. Then multiply
THE PROBLEM by the reputation damage to violated companies and the subsequent loss of
customer trust, and you get a sense of the enormity of the problem.
Security is not being addressed from a holistic
perspective throughout the software lifecycle. Consumer, government, education, healthcare, banking, retail, wholesale, insurance,
Some 80% of all security breaches are application the media – each has experienced some kind of data breach, with disastrous
results. No one is immune.
related. Every person involved should consider
security as an essential element. It’s almost an understatement to say that today’s applications – operating in
increasingly hostile environments, and faced with mounting regulatory and
compliance requirements – should be secure.
THE SOLUTION
Professional Certification – with CSSLPCM, we will
PROBLEM: LACK OF SECURITY.
establish an industry standard and instill best
SOLUTION: FINDING WAYS TO FILL THE HOLES.
practices.
We should be thinking about security now, not as an afterthought.
Any organization directly involved in software development needs to incorporate
security controls, and not just as an add on or a patch but rather, throughout the
entire software lifecycle – from concept and planning through operations and
maintenance, to the ultimate disposal.
No question – insecure software provides vulnerabilities that are easily exploited.
The entire development team needs to embrace security. Every member needs
to adopt a mindset which proclaims security first, security last and security in
between.
Confidentiality, integrity, availability, authentication, authorization and auditing - the
core tenets of security - must become requirements in the software lifecycle.
Without this level of commitment, you place information at risk. Incorporating
security early and maintaining it throughout all the different phases of the software
lifecycle has been proven to be 30-100 times less expensive and incalculably more
effective than wrenching security into an operational system.
Simply stated, what we’re talking about is requiring all software lifecycle
stakeholders to understand the importance of the role they play and to act
accordingly. And that means clients, business analysts, requirements analysts,
Software Lifecycle Stakeholder Chart
Top Management
Auditors Business
Unit Heads
Client Side PM
IT Manager
Business
Application
Analysts
Owners
Quality Developers
Assurance & Coders
Managers