Product Manager Security Training Reference Guide - The Product Manager Checklist
Product Manager Security Training Reference Guide - The Product Manager Checklist
1. Manage the Unexpected - Be sure to always plan for scope creep which will allow you to respond with little impact.
2. Employ Security Business Requirements – Be sure to understand the industry security trends and defining the security capabilities to meet customer’s needs.
3. Manage Third party risk - Make sure you are identifying the risks, and addressing those risk through the security terms in the supplier contract.
4. Integrate Security Into the development Lifecycle - Be sure to integrate security into the development lifecycle to increase the product quality by discovering, and remediating
vulnerabilities.
Understand Vulnerabilities. A vulnerability is a weakness in supported products, applications or cloud services that can be exploited, resulting in a negative impact to the confidentiality,
integrity, and/or availability of the supported products, applications, or cloud services. A vulnerability can be in two states:
• Potential vulnerability - a security weakness in which it has been determined that it can be exploited. However, the vulnerability has NOT been determined to have impact. It
would move from potential to confirmed when there is a determination of impact.
• Confirmed vulnerability - a security weakness that has been evaluated and confirm that if exploited WOULD have an impact on the product, application, or cloud service.
In Requirements Phase, be sure to meet security terms in contractual agreements and Review and sign off on the Security Engineering Plan for those teams following the Offer Lifecycle
Process framework.
Designing security in your product, application or cloud service is accomplished by incorporating secure design principles. Examples: Threat Modeling, Design to Deliver Security Updates.
Perform security testing. The most effective methods of finding security defects in a product, application or cloud service. Four distinct security testing services available: Network
Vulnerability & STIG Scanning, Web Application Security Testing, Verify SDL control implement, and Independent Security Testing.
Consider the DevSecOps program. This program focuses on "Security by design" practice ingrained and automated in the DevOps, continuous monitoring, measurement and reporting of
SDL controls, automatic enforcement of SDL controls and efficient security vulnerability handling through instrumentation of audit and logging.
Understand business impact of a vulnerability.
• Technical risks - The impact that the vulnerability has on the product, application, or cloud service - difficulty of exploitation; pervasiveness; ease of discovery; CVSS Score; and
workaround and mitigations.
Privacy Risk
The potential loss of control over personal information. Complete Privacy Impact Assessment (PIA) within Archer
•