Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:35 AM
Connect Directly

Microsoft to Share Its Secure Development Blueprint, Threat Modeling Tool

Customers, third-party developers can use Microsoft's model for writing more secure software - for free

Microsoft today said today it will open up its internal Security Development Lifecycle (SDL) framework to its third-party application developers and customers in the spirit of helping promote more secure software.

The software giant in November will make available via a free download the SDL Optimization Model and a new SDL Threat Modeling Tool, as well as launch the SDL Pro Network program.

“We feel that to achieve the promise of end-to-end trust and trustworthy computing, it’s very important that software be more secure, whether from Microsoft or someone else,” says Steve Lipner, senior director of security engineering strategy in Microsoft’s Trustworthy Computing Group. “We think of this as more of continuation of our commitment to collaborate with customers about secure development.”

Lipner says Microsoft will continue to promote secure software development in the industry. “Expect us to continue to do more of this,” he says.

This is yet another move by Microsoft to share with others in security efforts: Last month it announced that it would share vulnerability finds with Windows third-party application developers and help them fix security flaws in their software. (See New Microsoft Program Helps Fix Third-Party Vulnerabilities .) It also revamped its Patch Tuesday warning process to provide security software providers "advance information" about the vulnerabilities addressed by Microsoft security updates. (See Microsoft Revamps Patch Tuesday Warning Process.)

Microsoft's new SDL Optimization Model is a blueprint for developers within enterprises or third-party application firms to use for ensuring they build applications that are secure. It lets these organizations assess the state of their secure software development practices and build a roadmap for reducing security risks in their code.

“It’s for staying ahead of external vulnerability disclosure, by optimizing your processes so you’re ahead of the cure,” Lipner says. “It’s sort of like a checklist that says what are you doing and how do you measure up in your security practices.”

Microsoft’s SDL Pro Network, meanwhile, is a program that combines SDL best practices with security service providers acting as “live” expertise. The program begins a one-year pilot in November, with nine member organizations including Cigital, IOActive, NGS Software, n.runs AG, and Verizon Business.

“This includes service providers, consulting and training organizations that can help a development organization build more secure software by applying the SDL,” Lipner says.

The new SDL Threat Modeling Tool, which has been deployed internally at Microsoft, provides structured analysis of code, tracking and fixing potential security holes. It’s designed for any software developer to use, regardless of his or her security knowledge. It includes data flow diagrams, bug-tracking, and recommendations for "fuzzing" type vulnerability tests.

“A lot of the process of threat modeling has been either asset- or attacker-centric,” says Adam Shostack, senior program manager at Microsoft. “This [tool] allows us to start from the point of view of the software engineer... and to pull them through the process that doesn’t require them to think like an attacker or delve into anything they don’t know.”

“To date, there have not been any software-developer oriented design tools” like this, Shostack says. “We think this is a pretty exciting new space opening up.”

And SDLC isn’t just for Microsoft platforms, Lipner says. “We believe the principles of SDL apply to” non-Microsoft platforms, he says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    For Cybersecurity to Be Proactive, Terrains Must Be Mapped
    Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
    A Realistic Threat Model for the Masses
    Lysa Myers, Security Researcher, ESET,  10/9/2019
    USB Drive Security Still Lags
    Dark Reading Staff 10/9/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-14
    GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
    PUBLISHED: 2019-10-14
    tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
    PUBLISHED: 2019-10-14
    In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
    PUBLISHED: 2019-10-14
    Centreon 19.04 allows attackers to execute arbitrary OS commands via the Command Line field of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen).
    PUBLISHED: 2019-10-14
    In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.