O'Reilly logo

Security Development Lifecycle by Steve Lipner, Michael Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Stage 12: Security Response Execution

In this chapter:

This chapter summarizes the real-world challenges associated with responding to security vulnerabilities. It amplifies and complements the guidance provided in Chapter 15. This chapter also outlines what a software organization should do if it has not heeded the guidance in Chapter 15.

Following Your Plan

If you’ve faithfully followed the advice in Chapter 15, the reporting of a new security vulnerability is almost a non-event. Of course, hearing about a vulnerability in a product that you’ve worked hard to make secure is never pleasant, and you must use the lessons learned to avoid repeating the mistake. But if you have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required