Five Steps to Designing More Secure Software
Corporations, especially those in the financial space, where the consequences of failure and the value of assets that software protects are particularly high, have begun to refine the methods they use to build internal software. The key is to integrate security into the development liecycle - into requirements, design, development, testing, and deployment. But how does a company get started in building fundamentally more-secure software?
There is an accepted five-step process for developing software. This article describes the typical activities in a team development process. Each one has a unique benefit that enables an organization to move through the process in an orderly manner.