...
首页> 外文期刊>Bell Labs technical journal >Building Secure Products and Solutions
【24h】

Building Secure Products and Solutions

机译:构建安全的产品和解决方案

获取原文
获取原文并翻译 | 示例

摘要

Many security vulnerabilities in current information technology (IT) solutions and products are the result of a piecemeal "strap-on" security approach. The inclusion of many security add-ons, such as firewalls, antivirus software, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs), may imply that the security objectives were an afterthought, not adequately defined initially, or that the required security objectives were never met by the individual system components. In fact, a "grounds-up" approach to security, where each component is individually secure, in a defined network deployment scenario helps meet the need of minimal risk exposure. Security should not be bolted on; rather, it should be the prime consideration from the beginning and throughout the entire lifecycle-from concept to deployment and ongoing operation for each product in the solution. Given the ever increasing sophistication of attacks, developing and monitoring secure products have become increasingly difficult. Despite the wide- scale awareness of common security flaws in software products, e.g., buffer overflows, resource exhaustion, and structured query language (SQL) injection, the same flaws continue to exist in some of the current products. The objective of this paper is to introduce a technology-agnostic approach to integrating security into the product development lifecycle. The approach leverages the Bell Labs Security Framework, the foundation of the International Telecommunication Union, Telecommunication Standardization Sector (ITU-T) X.805 global standard. Building this framework into the product lifecycle supports the goal of realizing secure products. The security framework can be applied to any product domain to facilitate security requirements analysis and the development of usable tools such as checklists, guidelines, and security policies. The application of Bell Labs Security Framework concepts and its use in the development of secure products are illustrated using the example of a centrally managed firewall product.
机译:当前信息技术(IT)解决方案和产品中的许多安全漏洞是零星的“捆绑式”安全方法的结果。包括许多安全附件,例如防火墙,防病毒软件,入侵检测系统(IDS)和入侵防御系统(IPS),可能意味着安全目标是事后才想到的,最初并未得到充分定义,或者是必需的单个系统组件从未达到安全目标。实际上,在定义的网络部署方案中,“基础”安全性方法(其中每个组件都单独安全)有助于满足将风险最小化的需求。不应拧紧安全装置;相反,它应该是从开始到整个生命周期(从概念到解决方案中每个产品的部署以及持续运行)的首要考虑因素。鉴于攻击的复杂性越来越高,开发和监视安全产品变得越来越困难。尽管已广泛意识到软件产品中的常见安全漏洞,例如缓冲区溢出,资源耗尽和结构化查询语言(SQL)注入,但在某些当前产品中仍然存在相同的漏洞。本文的目的是介绍一种与技术无关的方法,以将安全性集成到产品开发生命周期中。该方法利用了贝尔实验室安全框架,该框架是国际电信联盟,电信标准化部门(ITU-T)X.805全球标准的基础。在产品生命周期中构建此框架可支持实现安全产品的目标。该安全框架可以应用于任何产品领域,以促进安全需求分析和开发可用工具(如清单,准则和安全策略)。以集中管理的防火墙产品为例,说明了贝尔实验室安全框架概念的应用及其在安全产品开发中的使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号