Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:35 AM
Connect Directly

Microsoft to Share Its Secure Development Blueprint, Threat Modeling Tool

Customers, third-party developers can use Microsoft's model for writing more secure software - for free

Microsoft today said today it will open up its internal Security Development Lifecycle (SDL) framework to its third-party application developers and customers in the spirit of helping promote more secure software.

The software giant in November will make available via a free download the SDL Optimization Model and a new SDL Threat Modeling Tool, as well as launch the SDL Pro Network program.

“We feel that to achieve the promise of end-to-end trust and trustworthy computing, it’s very important that software be more secure, whether from Microsoft or someone else,” says Steve Lipner, senior director of security engineering strategy in Microsoft’s Trustworthy Computing Group. “We think of this as more of continuation of our commitment to collaborate with customers about secure development.”

Lipner says Microsoft will continue to promote secure software development in the industry. “Expect us to continue to do more of this,” he says.

This is yet another move by Microsoft to share with others in security efforts: Last month it announced that it would share vulnerability finds with Windows third-party application developers and help them fix security flaws in their software. (See New Microsoft Program Helps Fix Third-Party Vulnerabilities .) It also revamped its Patch Tuesday warning process to provide security software providers "advance information" about the vulnerabilities addressed by Microsoft security updates. (See Microsoft Revamps Patch Tuesday Warning Process.)

Microsoft's new SDL Optimization Model is a blueprint for developers within enterprises or third-party application firms to use for ensuring they build applications that are secure. It lets these organizations assess the state of their secure software development practices and build a roadmap for reducing security risks in their code.

“It’s for staying ahead of external vulnerability disclosure, by optimizing your processes so you’re ahead of the cure,” Lipner says. “It’s sort of like a checklist that says what are you doing and how do you measure up in your security practices.”

Microsoft’s SDL Pro Network, meanwhile, is a program that combines SDL best practices with security service providers acting as “live” expertise. The program begins a one-year pilot in November, with nine member organizations including Cigital, IOActive, NGS Software, n.runs AG, and Verizon Business.

“This includes service providers, consulting and training organizations that can help a development organization build more secure software by applying the SDL,” Lipner says.

The new SDL Threat Modeling Tool, which has been deployed internally at Microsoft, provides structured analysis of code, tracking and fixing potential security holes. It’s designed for any software developer to use, regardless of his or her security knowledge. It includes data flow diagrams, bug-tracking, and recommendations for "fuzzing" type vulnerability tests.

“A lot of the process of threat modeling has been either asset- or attacker-centric,” says Adam Shostack, senior program manager at Microsoft. “This [tool] allows us to start from the point of view of the software engineer... and to pull them through the process that doesn’t require them to think like an attacker or delve into anything they don’t know.”

“To date, there have not been any software-developer oriented design tools” like this, Shostack says. “We think this is a pretty exciting new space opening up.”

And SDLC isn’t just for Microsoft platforms, Lipner says. “We believe the principles of SDL apply to” non-Microsoft platforms, he says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-07
    NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
    PUBLISHED: 2020-07-07
    "HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."
    PUBLISHED: 2020-07-07
    "HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy."
    PUBLISHED: 2020-07-07
    NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.
    PUBLISHED: 2020-07-07
    An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Cameralyzer allows attackers to write files to the SD card. The Samsung ID is SVE-2020-16830 (July 2020).