Chapter 6

Security in the Design Sprint

In Chapter 5, you found 10 best practices and principles for secure and resilient application software development that are used throughout the software development lifecycle (SDLC). In this chapter, you’ll see how these principles and best practices are applied in the design efforts of the SDLC, in which the constrained user stories from the earlier work become concrete elements of an overall solution that meets both functional and nonfunctional requirements (NFRs).

6.1 Chapter Overview

Topics you’ll find covered in Chapter 6 include details on how to design applications to help meet NFR constraints, how to perform application threat modeling to expose design defects so they are mitigated or countered ...

Get Secure, Resilient, and Agile Software Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.