8
Post-Release Support (PRSA1–5)
Many of the functions and their associated activities and best practices described in this chapter (see Figure 8.1) are handled by groups other than the software security group that would have the principal oversight over SDL activities and best practices (A1–A5) described in the previous chapters. In this chapter we will describe them as activities that are the responsibility of the centralized software security group in an organization. We have found that this is a much more cost-effective and efficient way to manage these activities using existing resources. This is precisely the reason we highly recommend that the core software security group be composed of senior software security architects who have hard ...
Get Core Software Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.