{"id":24113,"date":"2024-03-07T16:01:28","date_gmt":"2024-03-08T00:01:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/07\/news-17843\/"},"modified":"2024-03-07T16:01:28","modified_gmt":"2024-03-08T00:01:28","slug":"news-17843","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/07\/news-17843\/","title":{"rendered":"Evolving Microsoft Security Development Lifecycle (SDL): How continuous SDL can help you build more secure software"},"content":{"rendered":"<p><strong>Credit to Author: David Ornstein and Tony Rice| Date: Thu, 07 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p>The software developers and systems engineers at Microsoft work with large-scale, complex systems, requiring collaboration among diverse and global teams, all while navigating the demands of rapid technological advancement, and today we\u2019re sharing how they\u2019re tackling security challenges in the white paper: <a href=\"https:\/\/aka.ms\/SecureFutureInitiative-SDLwhitepaper\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cBuilding the next generation of the Microsoft Security Development Lifecycle (SDL)\u201d<\/a>, created by pioneers of future software development practices.<\/p>\n<h2 class=\"wp-block-heading\" id=\"two-decades-of-evolution\">Two decades of evolution<\/h2>\n<p>It\u2019s been 20 years since we introduced the <a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/\">Microsoft Security Development Lifecycle (SDL)<\/a>\u2014a set of practices and tools that help developers build more secure software, now used industry-wide. Mirroring the culture of Microsoft to uphold security and born out of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/01\/21\/celebrating-20-years-of-trustworthy-computing\/?web=1\">Trustworthy Computing<\/a> initiative, the aim of SDL was\u2014and still is\u2014to embed security and privacy principles into technology from the start and prevent vulnerabilities from reaching customers&#8217; environments.<\/p>\n<p>In 20 years, the goal of SDL hasn\u2019t changed. But the software development and cybersecurity landscape has\u2014a lot.<\/p>\n<p>With cloud computing, Agile methodologies, and continuous integration\/continuous delivery (CI\/CD) pipeline automation, software is shipped faster and more frequently. The software supply chain has become more complex and vulnerable to cyberattacks. And new technologies like AI and quantum computing pose new challenges and opportunities for security.<\/p>\n<p>SDL is now a critical pillar of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/02\/announcing-microsoft-secure-future-initiative-to-advance-security-engineering\/\">Microsoft Secure Future Initiative<\/a>, a multi-year commitment that advances the way we design, build, test, and operate our Microsoft Cloud technology to ensure that we deliver solutions meeting the highest possible standard of security.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"609\" height=\"600\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/03\/SEC20_Security_041-1_600.jpg\" class=\"card-img img-object-cover\" alt=\"Side view of a man, with monitors in the background, and a graphic design overlay\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/03\/SEC20_Security_041-1_600.jpg 609w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/03\/SEC20_Security_041-1_600-300x296.jpg 300w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Next generation of the Microsoft SDL<\/h2>\n<div class=\"mb-3\">\n<p>Learn how we&#039;re tackling security challenges.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/aka.ms\/SecureFutureInitiative-SDLwhitepaper\" class=\"btn btn-link text-decoration-none p-0\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Read the white paper<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"continuous-evaluation\">Continuous evaluation<\/h2>\n<p>Microsoft has been evolving the SDL to what we call &#8220;continuous SDL&#8221;. In short, Microsoft now measures security state more frequently and throughout the development lifecycle. Why? Because times have changed, products are no longer shipped on an annual or biannual basis. With the cloud and CI\/CD practices, services are shipped daily or sometimes multiple times a day.<\/p>\n<h2 class=\"wp-block-heading\" id=\"data-driven-methodology\">Data-driven methodology<\/h2>\n<p>To achieve scale across Microsoft, we automate measurement with a data-driven methodology when possible. Data is collected from various sources, including code analysis tools like CodeQL. Our compliance engine uses this data to trigger actions when needed.<\/p>\n<blockquote class=\"wp-block-quote blockquote\">\n<p><strong>CodeQL<\/strong>: A static analysis engine used by developers to perform security analysis on code outside of a live environment.<\/p>\n<\/blockquote>\n<p>While some SDL controls may never be fully automated, the data-driven methodology helps deliver better security outcomes. In pilot deployments of CodeQL, 92% of action items were addressed and resolved in a timely fashion. We also saw a 77% increase in CodeQL onboarding amongst pilot services.<\/p>\n<h2 class=\"wp-block-heading\" id=\"transparent-traceable-evidence\">Transparent, traceable evidence<\/h2>\n<p>Software supply chain security has become a top priority due to the rise of high-profile attacks and the increase in dependencies on open-source software. Transparency is particularly important, and Microsoft has pioneered traceability and transparency in the SDL for years. Just as one example, in response to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/17\/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements\/\">Executive Order 14028<\/a>, we added a requirement to the SDL to generate software bills of material (SBOMs) for greater transparency.<\/p>\n<p>But we didn\u2019t stop there.<\/p>\n<p>To provide transparency into <em>how<\/em> fixes happen, we now architect the storage of evidence into our tooling and platforms. Our compliance engine collects and stores data and telemetry as evidence. By doing so, when the engine determines that a compliance requirement has been met, we can point to the data used to make that determination. The output is available through an interconnected \u201cgraph\u201d, which links together various signals from developer activity and tooling outputs to create high-fidelity insights. This helps us give customers stronger assurances of our security end-to-end.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/03\/Picture1-1.webp\" alt=\"Design, Architecture, and Governance step by step delivery\" class=\"wp-image-133646 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/03\/Picture1-1.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"modernized-practices\">Modernized practices<\/h2>\n<p>Beyond making the SDL automated, data-driven, and transparent, Microsoft is also focused on modernizing the practices that the SDL is built on to keep up with changing technologies and ensure our products and services are secure by design and by default. In 2023, six new requirements were introduced, six were retired, and 19 received major updates. We\u2019re investing in new threat modeling capabilities, accelerating the adoption of new memory-safe languages, and focusing on securing open-source software and the software supply chain.<\/p>\n<p>We\u2019re committed to providing continued assurance to open-source software security, measuring and monitoring open-source code repositories to ensure vulnerabilities are identified and remediated on a continuous basis. Microsoft is also dedicated to bringing responsible AI into the SDL, incorporating AI into our security tooling to help developers identify and fix vulnerabilities faster. We\u2019ve built new capabilities like the AI Red Team to find and fix vulnerabilities in AI systems.<\/p>\n<p>By introducing modernized practices into the SDL, we can stay ahead of attacker innovation, designing faster defenses that protect against new classes of vulnerabilities.<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-can-continuous-sdl-benefit-you\">How can continuous SDL benefit you?<\/h2>\n<p>Continuous SDL can help you in several ways:<\/p>\n<ul>\n<li><strong>Peace of mind<\/strong>: You can continue to trust that Microsoft products and services are secure by design, by default, and in deployment. Microsoft follows the continuous SDL for software development to continuously evaluate and improve its security posture.<\/li>\n<li><strong>Best practices<\/strong>: You can learn from Microsoft&#8217;s best practices and tools to apply them to your own software development. Microsoft shares its SDL guidance and resources with the developer community and contributes to open-source security initiatives.<\/li>\n<li><strong>Empowerment<\/strong>: You can prepare for the future of security. Microsoft invests in new technologies and capabilities that address emerging threats and opportunities, such as post-quantum cryptography, AI security, and memory-safe languages.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"where-can-you-learn-more\">Where can you learn more?<\/h2>\n<p>For more details and visual demonstrations on continuous SDL, <a href=\"https:\/\/aka.ms\/SecureFutureInitiative-SDLwhitepaper\" target=\"_blank\" rel=\"noreferrer noopener\">read the full white paper<\/a> by SDL pioneers Tony Rice and David Ornstein.<\/p>\n<p>Learn more about the <a href=\"https:\/\/aka.ms\/builtinsecurity\">Secure Future Initiative and how Microsoft builds security into everything<\/a> we design, develop, and deploy.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/07\/evolving-microsoft-security-development-lifecycle-sdl-how-continuous-sdl-can-help-you-build-more-secure-software\/\">Evolving Microsoft Security Development Lifecycle (SDL): How continuous SDL can help you build more secure software<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/07\/evolving-microsoft-security-development-lifecycle-sdl-how-continuous-sdl-can-help-you-build-more-secure-software\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ornstein and Tony Rice| Date: Thu, 07 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p>The software developers and systems engineers at Microsoft work with large-scale, complex systems, requiring collaboration among diverse and global teams, all while navigating the demands of rapid technological advancement, and today we\u2019re sharing how they\u2019re tackling security challenges in the white paper: \u201cBuilding the next generation of the Microsoft Security Development Lifecycle (SDL)\u201d, created by the pioneers of future software development practices.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/07\/evolving-microsoft-security-development-lifecycle-sdl-how-continuous-sdl-can-help-you-build-more-secure-software\/\">Evolving Microsoft Security Development Lifecycle (SDL): How continuous SDL can help you build more secure software<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-24113","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24113"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24113\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24113"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}