CIA-level driven secure SDLC framework for integrating security into SDLC process

Sooyoung Kang, Seungjoo Kim

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

From the early 1970s, the U.S. government began to recognize that simple penetration testing could not assure the security quality of products. The results of penetration testing such as identified vulnerabilities and faults can vary depending on the capabilities of the team. In other words, the penetration testing team cannot assure that “vulnerabilities are not found” is equal to “product does not have any vulnerabilities”. So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed in a strict, systematic manner. The US government began to publish various standards related to development methodology and evaluation procurement systems, embedding the “Security-by-Design” concept from the 1980s. Security-by-Design involves reducing a product’s complexity by considering security from the early phase of the development life-cycle such as during the product requirements analysis and design phase to ultimately achieve trustworthiness of the product. Since then, the Security-by-Design concept has spread to the private sector, since 2002 this has often come in the form of Secure SDLC by Microsoft and IBM, this system is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the field because the standards or guidelines related to Secure SDLC contain only abstract and declarative content. Therefore, in this paper, we present a new framework that specifies the level of Secure SDLC desired by enterprises. We propose the CIA (functional Correctness, safety Integrity, security Assurance)-level based Security-by-Design framework which combines an evidence-based security approach standard with existing Secure SDLC. By using our methodology, we can quantitatively show any differences in Secure SDLC process level employed between the company in question one of its competitors. In addition, our framework is very useful when you want to build Secure SDLC in the field because you can easily derive detailed security activities and documents to build the desired level of Secure SDLC.

Original languageEnglish
JournalJournal of Ambient Intelligence and Humanized Computing
DOIs
Publication statusAccepted/In press - 2022

Keywords

  • SDL (Security Development Lifecycle)
  • SDLC (Software Development Life Cycle)
  • Secure SDLC (Secure Software Development Life Cycle)
  • Security engineering
  • Security-by-Design

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'CIA-level driven secure SDLC framework for integrating security into SDLC process'. Together they form a unique fingerprint.

Cite this