From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Secure software development
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Secure software development
- [Narrator] Welcome to this lesson on secure software development. In this lesson, we'll talk about three different frameworks that we can use for secure software development, and you're going to notice some recurring themes between each of these different frameworks, but I'll try to highlight what makes each one unique. On top of that, I've also provided some URLs that you can use to conduct your own research on these systems, which may be helpful to fully understand them prior to going into your exam. So first off, let's talk about the SSDLC or Secure Software Development Lifecycle. This framework modifies the traditional software development process and focuses on integrating security from the very beginning. Unlike the standard SDLC where security is often an afterthought, the SSDLC proactively includes security tasks in every phase, and this embodies the concept of shifting left, which is a popular industry term to describe integrating security tests and tasks much earlier into…
Contents
-
-
-
-
-
-
(Locked)
Domain 4 overview1m 59s
-
(Locked)
Cloud development basics, common pitfalls, and vulnerabilities13m 6s
-
(Locked)
Secure software development4m 8s
-
(Locked)
Business requirements, phases, and methodologies4m 53s
-
(Locked)
Cloud specific risks10m 21s
-
(Locked)
Threat modeling7m 19s
-
(Locked)
Layered security, secure coding, and configuration4m 11s
-
Cloud software assurance and validation6m 48s
-
(Locked)
Application testing5m 13s
-
(Locked)
Securing APIs and supply chains3m 8s
-
(Locked)
Validating and managing third-party and open-source software3m 54s
-
(Locked)
Supplemental security components8m 19s
-
(Locked)
Cryptography, sandboxing, virtualization, and orchestration9m 31s
-
(Locked)
Federated identity, identity providers (IdP), and SSO6m 10s
-
(Locked)
MFA, cloud access security brokers, and secrets management5m 35s
-
(Locked)
-
-