SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Procedure for Substantiated
Development of Measures to Design
Secure Software for Automated
Process Control Systems
Alexander Barabanov, Alexey Markov, Valentin Tsirlov,
Presentation Plan
2
1. Purpose and Objectives
2. Analysis of Current Secure Software
Development Models
3. Basic Set of Requirements for Secure
APCS Software Development and
Procedure of Selecting Secure Software
Development Controls
Study Relevance:
Detected Software Vulnerabilities by Type
3Source: https://www.scadahacker.com
Study Purpose and Objectives
4
Purpose: to create a framework that allows APCS software developers
to create multiple secure APCS software development controls and to
assess together with independent companies the compliance of the
applicable controls with the secure software development requirements
1. To analyze current controls
aimed at minimizing the number of
vulnerabilities in the APCS software
under development
2. To create a basic set of
requirements for secure APCS
software development
3. To develop a procedure for substantiated development of controls to
secure APCS software development
Results of Analysis of Current Secure Software
Development Models
5
Microsoft
SDL
ISO/IEC
15408
IEC
62443-4-1
OWASP
CLASP
ISO/IEC
27034
ISO/IEC
TR 24772
Suggested Expression Format
6
Requirements for secure software
development
Requirement name
Unique requirement ID
Reference to process as to ISO/IEC 12207
Objectives to be achieved
Developer action elements
Content and presentation of evidence elements
Evaluator action elements
Results of basic set of requirements
development: list (1)
7
Life cycle process as per
ISO/IEC 12207
Suggested requirements
Software requirements analysis
process
Defining software requirements
Software architecture design
and detailed design process
Information security threat modeling
Developing software architecture based on results of
threat modeling
Software construction and
integration processes
Identification of software development tools
Use of a Secure Coding Standards
Source code static analysis
Source code review
Creating software with regard to the developed
software architecture
Results of basic set of requirements
development: list (2)
8
Life cycle process as per
ISO/IEC 12207
Suggested requirements
Software qualification testing
process
Functional software testing
Penetration testing
Dynamic analysis of software code
Fuzz testing
Software problem resolution
process
Tracking and correction of detected software
vulnerabilities and software errors
Software documents and
configuration process
Use of configuration management system
Results of basic set of requirements
development: list (3)
9
Life cycle process as per
ISO/IEC 12207
Suggested requirements
Infrastructure management
process
Protection of configuration elements against
unauthorized access
Back-up and recovery of configuration elements
Audit
Human resources management
process
Employee training
Example
10
Parameter Parameter description
Name Source Code Statistic Analysis
Requirement ID KK-4
Software lifecycle
process
Software construction and integration processes
Goal - Detect and eliminate potentially vulnerable structures in the software source code;
- Generation of source data for performance of dynamic analysis tasks and penetration testing within the
framework of software qualification testing.
Elements of the
developer’s actions
Software developer shall perform static analysis of the software source code to detect potentially vulnerable structures
in the software source code. Static analysis of the software source code should be performed in relation to the
software components borrowed from a third-party developer if the software source code is available to them. The
software may be upgraded based on the results of the static analysis of the source code. If such upgrade is not
required or impossible, the developer should substantiate this fact.
Elements of the
certificate content
and provision of
documented
certificates
Documented certificates of the software source code analysis shall contain:
- Information about the frequency of the software source code static analysis;
- Name and identification features of the tools used for static analysis for the software source code;
- List of detected potentially vulnerable structures in the software source code (if any), description of actions aimed at
their elimination, or reasons for impossibility or lack of necessity in the software upgrade.
Elements of the
assessor’s actions
1. The Assessor shall study the submitted certificates and confirm that they meet the set requirements.
2. The Assessor shall make independent findings, that the developer performs static analysis of the software source
code by interviewing the employees of the software developer, who are engaged in the software development,
analysis of the software development framework.
Notes Static analysis of the software source code should be performed by the software developer or a third-party company
that is competent in detection of software vulnerabilities for the up-to-date version of the software code. The static
analysis of the software source code allows for finding potentially vulnerable structures in the source code, which may
lead to software vulnerabilities, and to verify the conformance of the software source code to the standard adopted by
the company for execution of the software source code.
Suggested Procedure
11
Summary
12
1. Based on analysis of existing research we designed a basic
set of requirements for secure APCS software
development.
2. We suggested a procedure for selecting secure APCS
software development controls, which ensures a possibility
for substantiated selection of secure software development
controls and is consistent with the of the Common Criteria
standards.
Contact Information
24 Elektrozavodskaya Ul., 107023
+7(495) 223-23-92
+7(495) 645-38-11
http://www.npo-echelon.ru
ab@cnpo.ru
14
Thank you for your attention!

Mais conteúdo relacionado

Mais procurados

24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Positive Hack Days
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 

Mais procurados (20)

Barabanov iccc 2014 (2)
Barabanov  iccc 2014 (2)Barabanov  iccc 2014 (2)
Barabanov iccc 2014 (2)
 
Jenkins- An open integration tool
Jenkins- An open integration toolJenkins- An open integration tool
Jenkins- An open integration tool
 
Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries
 
Application Security Risk Assessment
Application Security Risk AssessmentApplication Security Risk Assessment
Application Security Risk Assessment
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
 
Sast 2021
Sast 2021Sast 2021
Sast 2021
 
DevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOpsDevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOps
 
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
 
FDA software compliance 2016
FDA software compliance 2016FDA software compliance 2016
FDA software compliance 2016
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
 
Automating Open Source Security: A SANS Review of WhiteSource
Automating Open Source Security: A SANS Review of WhiteSourceAutomating Open Source Security: A SANS Review of WhiteSource
Automating Open Source Security: A SANS Review of WhiteSource
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 

Semelhante a Echelon_Sibcon-2016

SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
IJNSA Journal
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
IJNSA Journal
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 

Semelhante a Echelon_Sibcon-2016 (20)

software quality
software qualitysoftware quality
software quality
 
05 extended report
05 extended report05 extended report
05 extended report
 
Software testing
Software testingSoftware testing
Software testing
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materials
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 
SQA-Lecture-4.pptx
SQA-Lecture-4.pptxSQA-Lecture-4.pptx
SQA-Lecture-4.pptx
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Lecture 08 (SQE, Testing, PM, RM, ME).pptx
Lecture 08 (SQE, Testing, PM, RM, ME).pptxLecture 08 (SQE, Testing, PM, RM, ME).pptx
Lecture 08 (SQE, Testing, PM, RM, ME).pptx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
STLC & SDLC-ppt-1.pptx
STLC & SDLC-ppt-1.pptxSTLC & SDLC-ppt-1.pptx
STLC & SDLC-ppt-1.pptx
 
IT8076 – Software Testing Intro
IT8076 – Software Testing IntroIT8076 – Software Testing Intro
IT8076 – Software Testing Intro
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers
 
Qa analyst training
Qa analyst training Qa analyst training
Qa analyst training
 
Sdlc
SdlcSdlc
Sdlc
 
Sofware engineering
Sofware engineeringSofware engineering
Sofware engineering
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 
Most effective QA & testing types
Most effective QA & testing typesMost effective QA & testing types
Most effective QA & testing types
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Último (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

Echelon_Sibcon-2016

  • 1. Procedure for Substantiated Development of Measures to Design Secure Software for Automated Process Control Systems Alexander Barabanov, Alexey Markov, Valentin Tsirlov,
  • 2. Presentation Plan 2 1. Purpose and Objectives 2. Analysis of Current Secure Software Development Models 3. Basic Set of Requirements for Secure APCS Software Development and Procedure of Selecting Secure Software Development Controls
  • 3. Study Relevance: Detected Software Vulnerabilities by Type 3Source: https://www.scadahacker.com
  • 4. Study Purpose and Objectives 4 Purpose: to create a framework that allows APCS software developers to create multiple secure APCS software development controls and to assess together with independent companies the compliance of the applicable controls with the secure software development requirements 1. To analyze current controls aimed at minimizing the number of vulnerabilities in the APCS software under development 2. To create a basic set of requirements for secure APCS software development 3. To develop a procedure for substantiated development of controls to secure APCS software development
  • 5. Results of Analysis of Current Secure Software Development Models 5 Microsoft SDL ISO/IEC 15408 IEC 62443-4-1 OWASP CLASP ISO/IEC 27034 ISO/IEC TR 24772
  • 6. Suggested Expression Format 6 Requirements for secure software development Requirement name Unique requirement ID Reference to process as to ISO/IEC 12207 Objectives to be achieved Developer action elements Content and presentation of evidence elements Evaluator action elements
  • 7. Results of basic set of requirements development: list (1) 7 Life cycle process as per ISO/IEC 12207 Suggested requirements Software requirements analysis process Defining software requirements Software architecture design and detailed design process Information security threat modeling Developing software architecture based on results of threat modeling Software construction and integration processes Identification of software development tools Use of a Secure Coding Standards Source code static analysis Source code review Creating software with regard to the developed software architecture
  • 8. Results of basic set of requirements development: list (2) 8 Life cycle process as per ISO/IEC 12207 Suggested requirements Software qualification testing process Functional software testing Penetration testing Dynamic analysis of software code Fuzz testing Software problem resolution process Tracking and correction of detected software vulnerabilities and software errors Software documents and configuration process Use of configuration management system
  • 9. Results of basic set of requirements development: list (3) 9 Life cycle process as per ISO/IEC 12207 Suggested requirements Infrastructure management process Protection of configuration elements against unauthorized access Back-up and recovery of configuration elements Audit Human resources management process Employee training
  • 10. Example 10 Parameter Parameter description Name Source Code Statistic Analysis Requirement ID KK-4 Software lifecycle process Software construction and integration processes Goal - Detect and eliminate potentially vulnerable structures in the software source code; - Generation of source data for performance of dynamic analysis tasks and penetration testing within the framework of software qualification testing. Elements of the developer’s actions Software developer shall perform static analysis of the software source code to detect potentially vulnerable structures in the software source code. Static analysis of the software source code should be performed in relation to the software components borrowed from a third-party developer if the software source code is available to them. The software may be upgraded based on the results of the static analysis of the source code. If such upgrade is not required or impossible, the developer should substantiate this fact. Elements of the certificate content and provision of documented certificates Documented certificates of the software source code analysis shall contain: - Information about the frequency of the software source code static analysis; - Name and identification features of the tools used for static analysis for the software source code; - List of detected potentially vulnerable structures in the software source code (if any), description of actions aimed at their elimination, or reasons for impossibility or lack of necessity in the software upgrade. Elements of the assessor’s actions 1. The Assessor shall study the submitted certificates and confirm that they meet the set requirements. 2. The Assessor shall make independent findings, that the developer performs static analysis of the software source code by interviewing the employees of the software developer, who are engaged in the software development, analysis of the software development framework. Notes Static analysis of the software source code should be performed by the software developer or a third-party company that is competent in detection of software vulnerabilities for the up-to-date version of the software code. The static analysis of the software source code allows for finding potentially vulnerable structures in the source code, which may lead to software vulnerabilities, and to verify the conformance of the software source code to the standard adopted by the company for execution of the software source code.
  • 12. Summary 12 1. Based on analysis of existing research we designed a basic set of requirements for secure APCS software development. 2. We suggested a procedure for selecting secure APCS software development controls, which ensures a possibility for substantiated selection of secure software development controls and is consistent with the of the Common Criteria standards.
  • 13. Contact Information 24 Elektrozavodskaya Ul., 107023 +7(495) 223-23-92 +7(495) 645-38-11 http://www.npo-echelon.ru ab@cnpo.ru
  • 14. 14 Thank you for your attention!