student numbers
[ssproject1617.git] / TODO.txt
1 V2. Authentication: Daan
2 V3. Session Management: Wouter
3 V4. Access Control: Kelley
4 V5. Input Validation: Mart
5 V6. Output Encoding/Escaping: (Mart)
6 V7. Cryptography at rest: (Wouter)
7 V8. Error Handling & logging: Charlie
8 V9. Data Protection: (Kelley)
9 V11. HTTP Security: (Daan)
10 V16. Files and Resourses: (Charlie)
11
12
13 - Vandaag verdict (puntjes) uploaden (iedereen)!
14 - Na morgen heeft iedereen de resultaten van Fortify een keer bekeken
15 - Aanpak beschrijven, vóór volgende bijeenkomst (Daan)
16 - Iedereen een stuk reflectie schrijven (zie onder):
17 - Spreadsheet bouwen, vóór volgende bijeenkomst (Charlie)
18
19 Uit opdracht:
20
21 Reflection
22 Reflect on the whole process, including
23
24 the ASVS,
25 the use of static code analysis tools,
26 the way you organised the process,
27 and possibly also the TestCMS code.
28
29 For example, questions to consider are:
30 - [x] Kelley: How good (useful, clear, ...) is the ASVS? How could it be improved?
31 - [/] Charlie: How useful were code analysis tools? How could they be improved? How did you experience the rates and amounts of false and true positives? How might that be improved?
32 - [x] Wouter: What were the bottlenecks in doing the security review in your experience?
33 - [ ] Mart: Maybe in the points above you can distinguish different (types of) security flaws or verification requirements. E.g., are some (categories of) verification requirements easier to check than others?
34 - [x] Daan: If you would have to do something like this again, what would you do differently? Eg. about organising things within the group: i.e., in retrospect, what do you think the best approach is to organise and divide the work in a team? (Dividing the verification requirements over the team members? Or by dividing the code? Or letting everyone look at everything, because different people will spot different things? Or work in pairs where one person confirms the findings of the other? ...)
35 - [ ] Daan: About the TestCMS code: are there important aspects that could (or should) be changed to improve security? Or aspects that could be changed to facilitate doing a security review?
36 - [/] Wouter: This last question might be generalised, to (web) applications in general, rather than this specific example of the TestCMS: ie. if you were to develop an application that will need to be subjected to a security review, would you do anything differently, given your experience in doing this, and if so, what and why?