Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j

11/04/2022
by   Partha Das Chowdhury, et al.
0

Saltzer & Schroeder's principles aim to bring security to the design of computer systems. We investigate SolarWinds Orion update and Log4j to unpack the intersections where observance of these principles could have mitigated the embedded vulnerabilities. The common principles that were not observed include fail safe defaults, economy of mechanism, complete mediation and least privilege. Then we explore the literature on secure software development interventions for developers to identify usable analysis tools and frameworks that can contribute towards improved observance of these principles. We focus on a system wide view of access of codes, checking access paths and aiding application developers with safe libraries along with an appropriate security task list for functionalities.

READ FULL TEXT
research
07/12/2023

Security in Online Freelance Software Development: A case for Distributed Security Responsibility

Secure software is a cornerstone to safe and resilient digital ecosystem...
research
03/02/2021

I'm all Ears! Listening to Software Developers on Putting GDPR Principles into Software Development Practice

Previous research has been carried out to identify the impediments that ...
research
12/10/2020

Integration of Security Modules in Software Development Lifecycle Phases

Information protection is becoming a focal point for designing, creating...
research
09/09/2023

The Effectiveness of Security Interventions on GitHub

In 2017, GitHub was the first online open source platform to show securi...
research
07/07/2022

Towards Immediate Feedback for Security Relevant Code in Development Environments

Nowadays, the correct use of cryptography libraries is essential to ensu...
research
08/09/2021

Understanding Fuchsia Security

Fuchsia is a new open-source operating system created at Google that is ...
research
12/28/2018

A Precedent Approach to Assigning Access Rights

To design a discretionary access control policy, a technique is proposed...

Please sign up or login with your details

Forgot password? Click here to reset