Security Design Inspection
From Guidance Share
The security design inspection process analyzes application architecture and design from a security perspective. Use this activity to expose the high-risk design decisions that have been made. Do not rely solely on the use of design documentation as some design decisions will not be explicit but will have to be discovered through dialog and exploration. Use a combination of design documents, architecture experts and discussion to achieve the best results. The goal of the review is to decompose your application and identify key items, including trust boundaries, data flow, entry points, and privileged code. You must also keep in mind the physical deployment configuration of your application.
There are three important aspects to conducting a security design inspection:
- You evaluate your application architecture in relation to its target deployment environment and infrastructure.
- You review your design choices in each of the key vulnerability categories defined by a security frame.
- Finally, you conduct a tier-by-tier component analysis and examine the security mechanisms employed by your key components, such as your presentation layer, business layer, and data access layer.