کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
458264 696126 2008 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Building secure business applications at Microsoft
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Building secure business applications at Microsoft
چکیده انگلیسی

Like many global enterprises, Microsoft depends on internally developed and third-party line-of-business (LOB) applications to run its daily business activities. Nearly 4000 LOB applications are in service at Microsoft including a significant number of applications that contain business-sensitive data, customer data, or confidential employee data.In 2001 the Microsoft IT organization wanted to make sure that the company's security risk was appropriately managed. The Security Development Life cycle for IT (SDL-IT) was created within Microsoft IT to keep track of, assess, and address potential security and privacy vulnerabilities found in LOB applications. A specialist team called the Application Consulting and Engineering (ACE) Team was formed to manage the program, providing support and oversight ensuring that application development teams adhere to the SDL-IT process.This paper contains descriptions of the processes and standards that make up the SDL-IT process and discusses best practices that might be useful to other organizations wishing to create and enforce a security and privacy processes for LOB applications. While this paper describes Microsoft ITs own security and privacy process the authors recognize that every organization is unique and believe that the technology agnostic SDL-IT process and methodologies described can be implemented in other enterprises.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Security Technical Report - Volume 13, Issue 2, May 2008, Pages 105–110
نویسندگان
, ,