Microsoft To Expand Security Lifecycle Expertise

##AUTHORSPLIT##<--->

Microsoft is crossing the aisles to see the security process through from start to finish--not just internally, but for outside software developers too. The company plans to export its Security Development Lifecycle (SDL) process to a greater extent by releasing tools and support to IT pros later this fall, Redmond said last week.

The software giant wants to support developers in building fortified apps, starting at the design and development phase with SDL.

SDL is a "software security assurance process" that has been in place as part of Microsoft's internal architectural policy, going as far back as 2004, explained Steve Lipner, Microsoft's senior director of security engineering strategy for the Trustworthy Computing Group, in a Microsoft-published Q&A.

The SDL methodology, he said, has led to security improvements in flagship products such as Windows Vista and SQL Server. In recent months, hackers have favored attacks on SQL Server solutions via the Internet, although Microsoft has explained the vulnerability as due to insecure Web pages and Web applications.

SDL allows development managers and IT policy-makers to "assess the state of their secure software development practices and to create a vision and road map for reducing customer risk," Lipner explained.

In an effort to broaden its SDL practices, Microsoft is planning a three-pronged rollout, beginning in November.

First, Microsoft plans to make its SDL optimization model (PDF) freely available via a download on MSDN.

Second, if IT pros want to consult security experts, Redmond is forming a "SDL Pro Network," which will be available in November. The network will include trained independent channel partners and Microsoft staff members in the United States and Europe.

Microsoft also generally plans to share its SDL concepts with independent software vendors, partners and customers as a means to achieving security and privacy throughout the "entire computing ecosystem."

Finally, Microsoft plans to release an SDL Threat Modeling Tool 3.0 (PDF) in November. The tool is similar to risk assessment and analysis solutions used to map enterprise IT security.

Microsoft's SDL announcement is part of the company's broader outreach on security. In August at the Black Hat Conference, Microsoft promoted a more collaborative effort on security issues. It also promised for greater transparency during its security patch release cycles.

About the Author

Jabulani Leffall is a business consultant and an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others. He consulted for Deloitte & Touche LLP and was a business and world affairs commentator on ABC and CNN.

Featured

  • Indianapolis Public Schools Adopt DreamBox Math

    Thanks to a new partnership with Discovery Education, all Indianapolis Public Schools (IPS) K–8 students and teachers will gain access to DreamBox Math, which blends curriculum and continuous formative assessments that adapt to student needs to boost achievement.

  • The First Steps of Establishing Your Cloud Security Strategy

    In this guide, we'll identify some first steps you can take to establish your cloud security strategy. We'll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls® (CIS Controls®) and the CIS Benchmarks™.

  • Google Brings Gemini AI to Teens in the Classroom

    Google is making its Gemini large language model available for free for students ages 13 and up in the United States (age minimums vary by country), via Google Workspace for Education accounts.

  • A top-down view of a person walking through a maze with walls made of glowing blue Wi-Fi symbols on dark pathways

    Navigating New E-Rate Rules for WiFi Hotspots

    Beginning in funding year 2025, WiFi hotspots will be eligible for E-rate Category One discounts. Here's what you need to know about your school's eligibility, funding caps, tracking requirements, and more.