SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
case study
Section 508 Compliance Audit
for Security Product Suite
14.09.2012
uu Client: International independent software vendor
uu Business Area: Software publishing
uu Technology Set:
—— 2EE, WebServices, XML/XSD/ XSLT technologies for data handling and
modeling
—— C#, .NET for MS Visual Studio add-on,Java for Eclipse, and jDeveloper
plug-ins
—— Spring, Flex and SWT frameworks for features in thick tools and rich
clients
—— JAWS as screen reader application
uu Services Provided: Application evaluation, testing, audit, and
upgrade, System Development
uu Team size: 9 team members
uu Duration: 7 months
Summary
Perform an independent software audit to assess and ensure compliance to
Section 508 (Electronic and Information Technology) of the US Rehabilitation Act.
Challenge
Solution
The client, an international independent software vendor (ISV), had recently
acquired a suite of security analysis software for the business and government
agency markets. In order to market this product to the US government, it had to
comply with the standards in Section 508 (Electronic and Information Technology)
amendment to the US Rehabilitation Act that requires software used by Federal
agencies and departments is accessible to people with disabilities. The security
analysis software suite had to comply with the following technical standards in
Section 508:
§ 1194.21 Software applications and operating systems must be usable for
people with vision impairment. Usability requirements include alternative
keyboard navigation features and provisions for animation, color and contrast
settings, electronic forms, and ash rate.
§ 1194.22 Web-based intranet and internet information and applications must
be accessible to people with vision impairment that use assistive devices, such as
screen readers, to access information on the web.
The Security Assurance suite is a set of tightly integrated tools that identify,
prioritize, and fix security vulnerabilities in software. The suite includes a wide
range of tools that include ensure application security in thick clients, plug-
ins and add-ins, web-based tools, and server products. Luxoft evaluated and
upgraded seven applications in the Security Assurance software suite for Section
508 compliance by developing and executing specialized test cases for audit,
implementing changes for compliance, and performing the nal testing and audit
for client acceptance. In the first audit, Luxoft identified more than 1,200 Section
508 vulnerabilities.
02Luxoft - Case Study
Benefits
Customer Feedback
The client realized the following benefits from Luxoft’s software audit and
compliance upgrade:
uu The Security Assurance product is in compliance with US government
uu Standards and is available to sell to the large US government market
uu Artifacts provided by Luxoft:
—— Generic Section 508 Test Cases
—— JAWS conguration tips and tricks
—— Best practice knowledge base for development teams
—— Problems and solutions in knowledge base for development teams
—— Guidelines for teams to adapt development to the Section 508 standards
Detailed feedback is available on request.
03Luxoft - Case Study
About luxoft
Luxoft, a principal subsidiary of IBS Group, is a provider of advanced
application and software engineering outsourcing services for global and
regional enterprises. Luxoft builds partnerships with its clients, such as
Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based
on the culture of engineering excellence, innovation, and deep domain
expertise. Luxoft offers international delivery capability through its network
of state-of-the-art delivery centers in North America, Eastern Europe, and
Asia. Luxoft`s customers benefit from the right mix of technology skills,
industry knowledge, proprietary processes and methodologies, and a
choice of engagement models.
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
© 2012 Luxoft

Mais conteúdo relacionado

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Case study section 508 compliance audit luxoft for international independent software vendor

  • 1. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ case study Section 508 Compliance Audit for Security Product Suite 14.09.2012 uu Client: International independent software vendor uu Business Area: Software publishing uu Technology Set: —— 2EE, WebServices, XML/XSD/ XSLT technologies for data handling and modeling —— C#, .NET for MS Visual Studio add-on,Java for Eclipse, and jDeveloper plug-ins —— Spring, Flex and SWT frameworks for features in thick tools and rich clients —— JAWS as screen reader application uu Services Provided: Application evaluation, testing, audit, and upgrade, System Development uu Team size: 9 team members uu Duration: 7 months Summary Perform an independent software audit to assess and ensure compliance to Section 508 (Electronic and Information Technology) of the US Rehabilitation Act.
  • 2. Challenge Solution The client, an international independent software vendor (ISV), had recently acquired a suite of security analysis software for the business and government agency markets. In order to market this product to the US government, it had to comply with the standards in Section 508 (Electronic and Information Technology) amendment to the US Rehabilitation Act that requires software used by Federal agencies and departments is accessible to people with disabilities. The security analysis software suite had to comply with the following technical standards in Section 508: § 1194.21 Software applications and operating systems must be usable for people with vision impairment. Usability requirements include alternative keyboard navigation features and provisions for animation, color and contrast settings, electronic forms, and ash rate. § 1194.22 Web-based intranet and internet information and applications must be accessible to people with vision impairment that use assistive devices, such as screen readers, to access information on the web. The Security Assurance suite is a set of tightly integrated tools that identify, prioritize, and fix security vulnerabilities in software. The suite includes a wide range of tools that include ensure application security in thick clients, plug- ins and add-ins, web-based tools, and server products. Luxoft evaluated and upgraded seven applications in the Security Assurance software suite for Section 508 compliance by developing and executing specialized test cases for audit, implementing changes for compliance, and performing the nal testing and audit for client acceptance. In the first audit, Luxoft identified more than 1,200 Section 508 vulnerabilities. 02Luxoft - Case Study
  • 3. Benefits Customer Feedback The client realized the following benefits from Luxoft’s software audit and compliance upgrade: uu The Security Assurance product is in compliance with US government uu Standards and is available to sell to the large US government market uu Artifacts provided by Luxoft: —— Generic Section 508 Test Cases —— JAWS conguration tips and tricks —— Best practice knowledge base for development teams —— Problems and solutions in knowledge base for development teams —— Guidelines for teams to adapt development to the Section 508 standards Detailed feedback is available on request. 03Luxoft - Case Study
  • 4. About luxoft Luxoft, a principal subsidiary of IBS Group, is a provider of advanced application and software engineering outsourcing services for global and regional enterprises. Luxoft builds partnerships with its clients, such as Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based on the culture of engineering excellence, innovation, and deep domain expertise. Luxoft offers international delivery capability through its network of state-of-the-art delivery centers in North America, Eastern Europe, and Asia. Luxoft`s customers benefit from the right mix of technology skills, industry knowledge, proprietary processes and methodologies, and a choice of engagement models. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ © 2012 Luxoft