Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Evaluate Safe Code user stories #18

Open
jlyon opened this issue Jan 17, 2017 · 2 comments
Open

Evaluate Safe Code user stories #18

jlyon opened this issue Jan 17, 2017 · 2 comments
Assignees

Comments

@jlyon
Copy link
Contributor

jlyon commented Jan 17, 2017

http://safecode.org/publications/#safecodepublications-192

Spend ~1hr looking at these stories against the stories we've written and add some observations of them vs ours. Whether they suggest anything about the stories we've written. Add to #11

@jlyon jlyon changed the title Evaluate Safe Code Evaluate Safe Code user stories Jan 17, 2017
@aschmoe
Copy link
Contributor

aschmoe commented Jan 24, 2017

Thoughts:

  • A/D/T seems like a useful type of designation for the user stories. Maybe could be extended to include O - organization, or C - CIO/whatever for tasks that are like "Ensure we have a policy" or whatever
  • Furthermore approach of "O - Write access control policy, C - Keep logs showing access control, A - Ensure systems have access control, D - follow access control policy" seems to make the broadness of most of the NIST issues a little less daunting
  • Having more consistent/frequent example lists seems like a big win (is happening in some places)
  • Smaller granularity seems useful
  • Occurs to me that perhaps system / application packs might be useful. I'm adding a new service -> Is this service covered by the access control policy ->Frst get CIO to create new draft -> What users need to be on the new system? -> Are these users outside the organization? etc

@jlyon
Copy link
Contributor Author

jlyon commented Jan 24, 2017

  • CWE instead of NIST
  • Helpful concrete examples

Other Sources

  • SAFECode’s Fundamental Practices for Secure Software Development
  • CWE/SANS Top 25 Most Dangerous Development Errors
  • OWASP Top 10

While SAFECode’s Fundamental Practices for Secure
Software Development already lists a set of engi-
neering tasks for creating more secure software, it
may not be readily apparent to Agile development
teams how best to incorporate these tasks into
their unique environments. This section breaks
down the Fundamental Practices into familiar Agile
“stories” focused on security and derived from the
issues most commonly seen by SAFECode members
in their environments. Both the CWE/SANS Top 25
Most Dangerous Development Errors list (plus the 16
weaknesses on the cusp list) and the OWASP Top 10
list were also consulted to ensure broad coverage.

@jlyon jlyon mentioned this issue Jan 24, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants