"Notes" NetEase Micro professional-web safety Engineer -05.web Safety System construction

Source: Internet
Author: User
Tags knowledge base

Course overview

Unknown attack, how to know how to prevent? Through the previous courses we have mastered various attack skills, this lesson will teach you how to build safety in enterprises, to achieve the realm of knowledge and understanding, which is the ultimate need of each company security personnel.

Course Outline

The first section. About SDL

Section II. Vulnerability and Event handling

Section III. Security Operations overview


1. Introduction to SDL

Secure Development Life cycle (Security development Lifecycle)

Training: Core Security Training

Requirements: Security Requirements analysis/quality requirements, bug count/security and Privacy risk assessment

Design: Design Requirements analysis/reduce attack surface

Implementation: Using the specified tool/enable unsafe function/static resolution

Validation: Dynamic analysis/Fuzzy test/threat model and attack surface analysis

Release: Incident Response plan/Final security Review/release archive

Response: Execute Incident response Plan

For more information, see: HTTPS://WWW.MICROSOFT.COM/EN-US/SDL

2. Vulnerability and security handling

2.1 Security issues found:

Security Requirements Analysis: Project Early access, early detection of security issues. such as the use of web frameworks and language selection recommendations, sensitive information such as password saving scheme, whether there is upload function and so on.

Vulnerability handling: Detect security issues through scanners, automate, and perform periodically.

Event handling: The main methods include white-box testing and black-box testing, usually in black-box testing.

Intrusion detection: After the project on-line monitoring, including a variety of detection methods, by monitoring intrusion behavior to identify security issues.

Log analysis: After the project on-line analysis log, through the analysis of logs to find security issues. Common patterns are suspicious logs + manual analysis, suspicious logs + scanners.

Establish SRC: Security Emergency Response Center to discover security issues through security enthusiasts.

Collaborating with vulnerability collection platforms: Security issues are identified through vulnerability platforms through the power and impact of vulnerability platforms.

Other channels: Black production undercover, cooperation with law enforcement agencies and so on.

2.2 Handling security vulnerabilities

Defense: Input Check (check on server, data legality check: type, scope. Use white list), output cleanup (error messages, etc.), targeted defenses (cookies with HttpOnly), WAF (Web application Firewall).

FIX: Vulnerability Knowledge Base (provide detailed vulnerability description and fix method, need landing executable), bug fix cycle (need time limit, limit bug fix period according to vulnerability level), vulnerability review (requires security team review, business party and Development not trusted).

2.3 Security Event handling

Category: Intrusion/attack/information disclosure

Classification: Low risk/medium risk/high risk

Security Incident Response Process: Event confirmation, incident reporting, event handling, archiving and re-reel.

3. Security Operations Overview

Identifying and repairing security issues, building defenses, and responding quickly to attacks, SDL implements

How do I get to ground?

Internal work: Security scanning (periodic, periodic detection of security), security vulnerability alerts (attention to major vulnerabilities and time, early deployment of defense solutions, early delivery of solutions), emergency response, security monitoring and intrusion detection (by monitoring the discovery of security issues, timely response and processing).

External work Integration: the establishment of outside communication channels and processes (to provide unified external communications and IM tools, provide security-related communication groups, provide external feedback issues of the site), Security circle relationship (to understand the famous security companies and security circles, actively participate in security meetings, actively into the security circle to cooperate), Brand building (participating in cooperative meetings, holding security meetings, creating safety products and establishing safety labs).

"Notes" NetEase Micro professional-web safety Engineer -05.web Safety System construction

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.