Chapter 17. Stage 12: Security Response Execution

In this chapter:

This chapter summarizes the real-world challenges associated with responding to security vulnerabilities. It amplifies and complements the guidance provided in Chapter 15. This chapter also outlines what a software organization should do if it has not heeded the guidance in Chapter 15.

Following Your Plan

If you’ve faithfully followed the advice in Chapter 15, the reporting of a new security vulnerability is almost a non-event. Of course, hearing about a vulnerability in a product that you’ve worked hard to make secure is never pleasant, and you must use the lessons learned to avoid repeating the mistake. But if you have ...

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.