Secure Development Methodology Classification Specification

annotation



The article presents a study of the specification of methods, tools and methodologies for safe development, which is adopted on the territory of the Russian Federation, including the experience gained from foreign colleagues, "best practices", canons and other kinds of options that are currently used.



The research is viewed from the commercial sector and the most effective secure development formats. The study is considered with the application in the practical part of these options and their specifics in general and in a private format. The purpose of this article is to transfer experience and data analytics of the applied methodologies, methods and development tools in a secure execution. The article presents an analysis, an appropriate analysis of the current market, legislation, in terms of developing information systems and environments in a secure design, which is also referred to as secure development, and which is gaining a "critical mass" of popularity in various industry companies every day due to the tightening recommendations and requirements of IS regulators [1].



It is also worth noting that the popularity of secure development is primarily due to the fact that the number of risks, information security incidents is critically growing every day. Progressive cybercriminals began to understand in detail the principles of operation of organizations that are exposed to attacks, while they manage to enter the group of trusted users due to a lack of competencies and employees in these companies. Also, attackers have learned to use more sophisticated tools, methods for organizing intrusions, "exploits" and others, to obtain confidential information, fraudulent activities. This topic is given to a significant part of the profile articles on the ISI.



Introduction



, , . . OWASP TOP 10, . , , , , โ„–608, โ„–55 . , , , , ( ), 56939.



, IT , : ( ) . . . , , , , , , โ€“ , , . , , , , ( ) : , , . , , , , ( ) . - , .





, , , , :



  1. :

    1.1. ;

    1.2. ;

    1.3. .
  2. , ;
  3. ;
  4. , , :

    4.1. - ;

    4.2. - .
  5. , ;
  6. ;
  7. ;
  8. , โ€” ;
  9. ;
  10. - , ;
  11. - , - ;
  12. ;
  13. ;
  14. , , :

    14.1. ;

    14.2. ;

    14.3. ;

    14.4. ;

    14.5. .
  15. .


, , ( ) , :



  1. , , , ;
  2. , [2-5].


, , , . , , , โ€” , , . IT-, : , , , , , , , โ€” , .



, , , โ€” , , , , - , . , , , .



โ„–149 , , : ยซ โ€“ ยป. , , , , , , .



, :



  1. : , ;
  2. , : , ;
  3. , UI/UX, - , ( ), .




โ€” , , , . , , . - . , , : , [6-10].



- , :



  1. , , , ;
  2. , , . ;
  3. , , S.M.A.R.T.;
  4. , , , , ;
  5. - , , . , , .


. . - , , .



..: " . ", :



  1. , , , , , :

    1.1. , , , , :

    1.1.1. , ;

    1.1.2. , .

    1.2. - (), . , , , UI/UX . : , , , :

    1.2.1. - , , , ;

    1.2.2. , , ;

    1.2.3. , , .

    1.3. โ€“ - , , , - , , :

    1.3.1. , : - โ€” , , , , ;

    1.3.2. , , , ;

    1.3.3. , , [11].

    1.4. , - , , :

    1.4.1. , ;

    1.4.2. , .

    1.5. , , , . , - . , .
  2. โ€” - , :

    2.1. โ€“ , , ;

    2.2. , , ;

    2.3. , , .
  3. , . , : , ;
  4. , , ;
  5. ..: " ", โ€“ RAD (Rapid Application Development). โ€” . :

    5.1. , , . : , 2 10 , , 100 , ;

    5.2. , , . 2 6 , , , .


, , , . , OWASP TOP 10, , ISO/IEK 27000.





, , . , โ€” , "", "" , . , " " โ€” . .



, (, ) , , :



  1. , , UI/UX , . , , , : ;
  2. , , "" , : , , , UI/UX;
  3. , , , ;
  4. , .


, , . , . , , . , , .



, , :



  1. , ;
  2. , ;
  3. Digital, ;
  4. - ;
  5. , , .


, , : " ?". , "" , . , "", , . , โ€” [12].



, :



  1. Manifest for Agile Software Development, ;
  2. SCRUM โ€” " ", , , . ,  stand-up, , :

    2.1. ?

    2.2. ?

    2.3. ?

    2.4. ?

    2.5. .
  3. : eXtreme Programming, XP, , , , "" ;
  4. Crystal โ€” , , , , :

    4.1. , ;

    4.2. , , . , .
  5. , : Adaptive Software Development, ASD โ€” , , . , . : " โ€“ โ€“ " , : " โ€“ โ€“ ยป;
  6. - , : Feature Driven Development, FDD, , , :

    6.1. ;

    6.2. ;

    6.3. ;

    6.4. ;

    6.5. .


, , , , , , , , โ€” "". , , , , , , "". PenTest, DevSecOps , [13-15].





, , . , , . , , .



, , , , .



, , . , , , , .



These secure development methodologies can provide organizations with increased profits, version control, intrusion prevention, risk minimization, and provide a trusted level among their users, which will raise the organization's assets and liabilities.



PS: if you put a minus, please comment so that in the future I do not make such mistakes.



Literature

[1] ยซ , ยป โ„– 149 โ€” 27 2006 ;

[2] 6.30-2003 ยซ - ยป;

[3] 7.0.8.-2013 " โ€” ";

[4] 6.10.4-84 ยซ , ยป;

[5] 6.10.5-87 ยซ . -ยป;

[6] ;

[7] 21 1993 โ„–5485-1ยซ ยป;

[8] ยซ - ยป;

[9] .. : / .. . โ€“ : - , 2007. โ€“ 359 .;

[11] , .. . . / .. . โ€“ .: , 1997. โ€“ 246 .;

[12] . ;

[13] .., ., .. 34.10-1994, 34.10-2001 34.10-2012// . 2016. โ„– 1 (19). . 51-56;

[14] . ., . โ€ฆ ;

[15] .., .., .., - // . 2017. โ„– 4 (22). . 2-9.




All Articles