To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Microsoft Security Development Lifecycle

From Wikipedia, the free encyclopedia

The Microsoft Security Development Lifecycle (SDL) is the approach Microsoft uses to integrate security into DevOps processes (sometimes called a DevSecOps approach). You can use this SDL guidance and documentation to adapt this approach and practices to your organization.  

The practices described in the SDL approach can be applied to all types of software development and all platforms from classic waterfall through to modern DevOps approaches and can be generally applied across:  

  • Software – whether you are developing software code for firmware, AI applications, operating systems, drivers, IoT Devices, mobile device apps, web services, plug-ins or applets, hardware microcode, low-code/no-code apps, or other software formats. Note that most practices in the SDL are applicable to secure computer hardware development as well.  
  • Platforms – whether the software is running on a ‘serverless’ platform approach, on an on-premises server, a mobile device, a cloud hosted VM, a user endpoint, as part of a Software as a Service (SaaS) application, a cloud edge device, an IoT device, or anywhere else.  

The SDL recommends 10 security practices to incorporate into your development workflows. Applying the 10 security practices of SDL is an ongoing process of improvement so a key recommendation is to begin from some point and keep enhancing as you proceed. This continuous process involves changes to culture, strategy, processes, and technical controls as you embed security skills and practices into DevOps workflows.

The 10 SDL practices are:

  1. Establish security standards, metrics, and governance
  2. Require use of proven security features, languages, and frameworks
  3. Perform security design review and threat modeling
  4. Define and use cryptography standards
  5. Secure the software supply chain
  6. Secure the engineering environment
  7. Perform security testing
  8. Ensure operational platform security
  9. Implement security monitoring and response
  10. Provide security training


YouTube Encyclopedic

  • 1/3
    Views:
    4 437
    375 297
    651
  • Security - Microsoft Security Development Lifecycle SDL
  • Introduction To Software Development LifeCycle | What Is Software Development? | Simplilearn
  • Microsoft 365 security development and operation

Transcription

Versions

Version Release date Link
1 January 2004 Unreleased
2 July 2004 Unreleased
2.1 January 2005 Unreleased
2.2 July 2005 Unreleased
3 January 2006 Unreleased
3.2 2008-04-15 http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=24308
4.1 2009-06-01 http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=15526
4.1a 2010-04-15 http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=17701
5 2010-05-11 http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=12285
5.2 2012-05-23 http://www.microsoft.com/en-us/download/details.aspx?id=29884
6 2024-05-21 https://www.microsoft.com/securityengineering/sdl

See also

Further reading

  1. Establish culture, strategy and processes - Innovation security (CAF Secure)
  2. Define Security Practices and Controls - DevSecOps controls
  3. Assess your current workloads with the well architected security assessment - Well Architected Review

External links


This page was last edited on 27 May 2024, at 11:59
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.