The Software Assurance Competency Model: A Roadmap to Enhance Individual Professional Capability
|
|
|
- Cuthbert August French
- 9 years ago
- Views:
Transcription
1 The Software Assurance Competency Model: A Roadmap to Enhance Individual Professional Capability Nancy R. Mead Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania United States [email protected] Dan Shoemaker University of Detroit Mercy Detroit, Michigan United States [email protected] Abstract This paper describes a software assurance competency model that can be used by individual professionals to improve their software assurance skills. It can also be used by universities to align course content with skills needed in industry, and it can be used by industry to help employee professional growth as well as to screen prospective employees. The knowledge and skill areas in the competency model are based on the Master of Software Assurance reference curriculum that has been previously approved by the IEEE Computer Society and ACM. The model is aligned with a similar effort by the IEEE Professional Activities Board to develop a competency model for software engineering practitioners. 1. Competency and the Profession Software was with us long before the creation of FORTRAN [1]. The roots of software engineering as a profession go back to the late 1960s and early 1970s, with the emergence of structured programming, structured design, and process models such as the Waterfall model [19]. What that means is that, at a minimum, software engineering has been a regular profession for at least 42 years. In those four decades there have been numerous general attempts to define what a competent software professional should look like. Examples of this range from Humphrey s first published work on capability [12], through the effort to define software engineering as a profession, accompanied by a Software Engineering Body of Knowledge [13] and the People Capability Maturity Model [3]. The success of these efforts is still debatable, but one thing is certain: up to this point, there have been only a few narrowly focused attempts to define the professional qualities needed to develop a secure software product. The Software Assurance (SwA) Competency Model was developed to address this missing element of the profession. The obvious question, given all of this prior work, is, Why do we need one more professional competency model? The answer lies in the significant difference between the competencies required to produce working code and those that are needed to produce software free from exploitable weaknesses. That difference is underscored by the presence of the adversary.
2 In the 1990s it was generally acceptable for software to have flaws as long as those flaws did not impact program efficiency or the ability to satisfy user requirements. So development and assurance techniques focused on proper execution with no requirements errors. Now, bad actors can exploit an unintentional defect in a program to cause all kinds of trouble. So although they are related in some ways, the professional competencies that are associated with the assurance of secure software merit their own specific framework. A specific model for software assurance competency provides two advantages for the profession as a whole. First and most important, a standard model allows prospective employers to define the fundamental capabilities needed by their workforce. At the same time it will allow organizations to establish a general, minimum set of competency requirements for its employees; and more importantly it will allow companies to tailor an exact set of competency requirements for any given project. From the standpoint of the individual worker, a competency model will provide software assurance professionals with a standard roadmap that they can use to improve performance by adding specific skills needed to obtain a position and climb the competency ladder for their profession. For example, a new graduate starting in an entry-level position could map out a path for enhancing their skills and planning their career advances as a software assurance professional. In many respects this latter feature makes a professional competency model a significant player in the development of the workforce of the future, which of course is of interest to software engineering educators and trainers. 2. The Software Assurance Competency Model For the purposes of this Model, the following definition of software assurance will be used [14]: Application of technologies and processes to achieve a required level of confidence that software systems and services function in the intended manner, are free from accidental or intentional vulnerabilities, provide security capabilities appropriate to the threat environment, and recover from intrusions and failures. In the process of developing the Software Assurance Competency Model, a number of other competency models and supporting material were studied and analyzed [4, 2]. The Professional Advisory Board (PAB) of the IEEE Computer Society contributed a draft Framework for IEEE PAB Competency Models [20, 21]. This Framework offers an introduction to competency models and presents guidelines for achieving consistency among them. This is built around a generic structure for a professional area. It is then instantiated with specific knowledge, skills, and effectiveness levels for a particular computing profession, for instance, software engineering practitioner. Other work on competency models consulted for the software assurance competency model include [7], [10], [18], [22], and [17]. Balancing Software Engineering Education and Industrial Needs [17] is an article that reports on a study that was conducted to help both academia and the software industry form a picture of the relationship between the competencies of recent graduates of undergraduate and graduate software engineering programs and the competencies needed to perform as a software engineering professional. A key reference for the SwA Competency Model is the Master of Software Assurance Reference Curriculum [14]. The curriculum underwent both internal and public review, and was endorsed by both ACM and IEEE Computer Society as being appropriate for a Master s degree
3 in Software Assurance. The curriculum document includes a mapping of the software assurance topic areas to GSwE2009 [7], thus providing a comparison to software engineering knowledge areas. Since then, elements of the curriculum have been adopted by various universities, including the Air Force Academy [8, 9], Carnegie Mellon University, Stevens Institute of Technology, and notably by (ISC) 2, a training and certification organization. As noted below, the MSwA Curriculum was the primary source for the knowledge and skills used in the Competency Model for various levels of professional competency. The Software Assurance Competency Model will provide employers of software assurance personnel with a means to assess the software assurance capabilities of current and potential employees. In addition, along with the MSwA reference curriculum, this model is intended to guide academic or training organizations in the development of education and training courses to support the needs of organizations that are hiring and developing software assurance professionals. The SwA Competency Model will enhance the guidance of software engineering curricula by providing information about industry needs and expectations for competent security professionals [14, 15, 16]; the Model will also provide software assurance professionals with direction and a progression for development and career planning. Finally, a standard competency model will provide support for professional certification activities. 2.1 SwA Competency Model Features In the software assurance competency model, five levels (L1-L5) of competency are employed to distinguish different levels of professional capability, relative to knowledge, skills, and effectiveness [20]: L1 - Technician Possesses technical knowledge and skills, typically gained through a certificate or an associate degree program, or equivalent knowledge and experience. May be employed in system operator, implementer, tester, and maintenance positions with specific individual tasks assigned by someone at a higher hierarchy level. Main areas of competency are SOA, SFA, and SSA. (see Table 1) Major tasks: low-level implementation, testing, and maintenance. L2 - Professional Entry Level Possesses application-based knowledge and skills and entry-level professional effectiveness, typically gained through a bachelor s degree in computing or through equivalent professional experience. May perform all tasks of L1 and additionally: manage a small internal project, supervise and assign sub-tasks for L1 personnel, supervise and assess system operations, and implement commonly accepted assurance practices. Main areas of competency are SFA, SSA, and AA. (see Table 1) Major tasks: requirements fundamentals, module design, implementation.
4 L3 - Practitioner Possesses breadth and depth of knowledge, skills, and effectiveness beyond the L2 level, and typically has two to five years of professional experience. May perform all tasks of L2 personnel and additionally set plans, tasks and schedules for in-house projects, define and manage such projects and supervise teams on the enterprise level, report to management, assess the assurance quality of a system, implement and promote commonly accepted software assurance practices. Main areas of competency are RM, AA, and AM. (see Table 1) Major tasks: requirements analysis, architectural design, tradeoff analysis, risk assessment. L4 - Senior Practitioner Possesses breadth and depth of knowledge, skills, and effectiveness and a variety of work experiences beyond L3, with five to ten years of professional experience and advanced professional development, at the master s level or with equivalent education/training. May perform all tasks of L3 personnel and identify and explore effective software assurance practices for implementation, manage large projects, interact with external agencies, etc. Main areas of competency are RM, AA, AM, and AALC. (see Table 1) Major tasks: assurance assessment, assurance management, risk management across the life cycle L5 - Expert Possesses competency beyond L4; advances the field by developing, modifying, and creating methods, practices, and principles at the organizational level or higher; has peer/industry recognition. Typically includes a low percentage of an organization s work force within the SwA profession (e.g., 2 % or less). 2.2 SwA Knowledge, Skills, and Effectiveness The primary source for SwA Competency Model knowledge and skills is the Core Body of Knowledge (CorBoK), contained in Software Assurance Curriculum Project, Volume I: Master of Software Assurance Reference Curriculum [14]. The CorBoK consists of the knowledge areas listed in Table 1. Each knowledge area is further divided into second-level units as shown in Table 3. For each unit, competency activities are described for each of the levels L1-L5.
5 Table 1. CorBoK Knowledge Areas and Competencies Knowledge Area (KA) AALC: Assurance Across Life Cycles L3, L4, L5 RM: Risk Management L2, L3, L4, L5 AA: Assurance Assessment L1, L2, L3, L4 AM: Assurance Management L3, L4, L5 SSA: System Security Assurance L1, L2, L3, L4 SFA: System Functionality Assurance L1, L2, L3 SOA: System Operational Assurance L1, L2, L3 KA Competency The ability to incorporate assurance technologies and methods into life-cycle processes and development models for new or evolutionary system development, and for system or service acquisition. The ability to perform risk analysis and tradeoff assessment, and to prioritize security measures. The ability to analyze and validate the effectiveness of assurance operations and create auditable evidence of security measures. The ability to make a business case for software assurance, lead assurance efforts, understand standards, comply with regulations, plan for business continuity, and keep current in security technologies. The ability to incorporate effective security technologies and methods into new and existing systems. The ability to verify new and existing software system functionality for conformance to requirements and to help reveal malicious content. The ability to monitor and assess system operational security and respond to new threats. Other than a unit on Ethics and Integrity in the System Security Assurance Knowledge Area, the CorBoK does not contain topics on competency associated with effectiveness; the effectiveness attributes are listed in Table 2 (adapted from [20]). In Table 2, for a given attribute, there is no differentiation in effectiveness for the different competency levels; however, professionals would be expected to show an increase in the breadth and depth of capability in these areas of effectiveness as they proceed through their careers and move to higher competency levels.
6 Table 2. Competency Attributes of Effectiveness Aptitude is exhibited by the ability do a certain software assurance activity at a certain level of competence. Aptitude is not the same as knowledge or skill but rather indicates the ability to apply knowledge in a skillful way. L2-L5 Initiative is exhibited by the ability to start and follow through on a software assurance work activity with enthusiasm and determination. L1-L5 Enthusiasm is exhibited by being interested in and excited about performing a software assurance work activity. L1-L5 Willingness is exhibited by undertaking a work activity, when asked, even if it is an activity the individual is not enthusiastic about performing. L1-L5 Communication is exhibited by expressing thoughts and ideas in both oral and written forms in a clear and concise manner while interacting with team members, managers, project stakeholders, and others. L2-L5 Teamwork is exhibited by working enthusiastically and willingly with other team members while collaborating on work activities. L1-L5 Leadership is exhibited by effectively communicating a vision, strategy, or technique that is accepted and shared by team members, managers, project stakeholders, and others. L3-L5 2.3 Competency Designations Table 3 presents a portion of the CorBoK knowledge areas and second-level units, along with a description of the appropriate knowledge and skills for each competency level and the effectiveness attributes. The complete table can be found in the competency report [11]. A designation of L1 applies to levels L1 through L5; a designation of L2 applies to L2 through L5; and so on. The level descriptions indicate the competency activities that are demonstrated at each level.
7 Software Assurance Risk Management Risk Management Risk Management Process Risk Management Concepts Software Assurance Processes and Practices Assurance Across Life Cycles Software Life-Cycle Processes Table 3. SwA Competency Designations Knowledge/Skill/Effectiveness KA Unit Competency Activities L1: Understand and execute the portions of a defined process applicable to their assigned tasks. L2: Manage the application of a defined life-cycle software process for a small internal project. L3: Lead and assess process application for small and medium sized projects, over a variety of life-cycle phases, such as new development, acquisition, operation, and evolution. L4: Manage the application of a defined life-cycle software process for a large project, including selecting and adapting existing SwA practices by life-cycle phase. L5: Analyze, design, and evolve life-cycle processes that meet the special organizational or domain needs and constraints. L1: Possess general awareness of methods, procedures, and tools used to assess assurance processes and practices. L2: Apply methods, procedures, and tools to assess assurance processes and practices. L3: Manage integration of assurance practices into typical life-cycle phases. L4: Lead the selection and integration of life-cycle assurance processes and practices in all projects, across an organization. L5: Analyze assurance assessment results to determine best practices for various life-cycle phases. L1: Understand the basic elements of risk analysis. L2: Explain how risk analysis is performed. L3: Determine the models, process, and metrics to be used in risk management for small internal projects. L4: Develop the models, processes, and metrics to be used in risk management of any sized project. L5: Analyze the effectiveness of the use and application of risk management concepts across an organization. L1: Describe an organization risk management process. L2: Identify and classify the risks associated with a project. L3: Analyze the likelihood, impact, and severity of each identified risk for a project. Plan and monitor risk management for small to medium sized projects. L4: Plan and monitor risk management for a large project. L5: Develop a program for analyzing and enhancing risk management practices across an organization. L1: Describe risk analysis techniques for vulnerability and threat risks. L2: Apply risk analysis techniques to vulnerability and threat risks. L3: Analyze and plan for mitigation of software assurance risks for small systems. L4: Analyze and plan for mitigation of software assurance risks for both new and existing systems. L5: Assess software assurance processes and practices across an organization and propose improvements.
8 2.4 Examples of the Software Assurance Competency Model in Practice There are a number of ways the Software Assurance Competency Model can be applied in practice. For example, an organization intending to hire an entry-level software assurance professional could examine the L1-L2 levels and incorporate elements of them into their job descriptions. These levels could also be used during the interview process by both the employer and the prospective employee, to assess the actual expertise of the candidate. Another application is by faculty members who are developing courses in software assurance or adding software assurance elements to their software engineering courses. The use of the levels allows faculty to easily see the depth of content that is suitable for courses at the community college, undergraduate, and graduate levels. For example, undergraduate student outcomes might be linked to the L1 and L2 levels, whereas graduate courses aimed at practitioners with more experience might target higher levels. In industry, the model could be used to determine if specific competency areas were being overlooked. These areas could point towards corresponding training needs. With a bit of effort, trainers can tailor their course offerings to the target audience. The Model eliminates some of the guesswork involved in deciding what level of material is appropriate for a given course. It can also be used by faculty who are already teaching such courses to assess whether the course material is a good fit for the target audience. The authors of this paper are currently teaching software assurance courses and can use the model to revisit and tailor their syllabi accordingly. 3. Summary and Future Plans This Software Assurance Competency Model was developed to create a foundation for assessing and advancing the capability of software assurance professionals. The span of competency levels L1 through L5 and the decomposition into individual competencies based on the knowledge and skills described in the SwA CorBoK [14] provide the detail necessary for an organization or individual to determine SwA competency across the range of knowledge areas and units. The Model also provides a framework for an organization to adapt its features to the organization s particular domain, culture, or structure. The Model has been reviewed by invited industry reviewers and mapped to actual industry positions. It has additionally undergone public review prior to publication. Our plan is to work closely with the IEEE Professional Advisory Board in order to be consistent with other similar documents, and to map the competency model to other selected competency models. The most important outcome of this model will be a better trained and educated workforce. As the needs of the software industry for more secure applications continue, the recommendations of this model can be utilized to ensure better and more trustworthy practice in the process of developing and sustaining an organization s software assets. That guidance going forward is a critical linchpin in the overall effort to create trusted systems and provides the necessary reference to allow organizations and individuals to help achieve cybersecurity.
9 Acknowledgment The authors appreciate the review and comments provided by Tom Hilburn, the lead author of the competency model, and the contributions of the other authors, Mark Ardis, Glenn Johnson, and Andrew Kornecki. This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. This material has been approved for public release and unlimited distribution. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at and Alternate I. Capability Maturity Model, CMM are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM References [1] Backus, J. W.; H. Stern, I. Ziller, R. A. Hughes, R. Nutt, R. J. Beeber, S. Best, R. Goldberg, L. M. Haibt, H. L. Herrick, R. A. Nelson, D. Sayre, P. B. Sheridan, "The FORTRAN Automatic Coding System". Western joint computer conference: Techniques for reliability, Los Angeles, California: Institute of Radio Engineers, American Institute of Electrical Engineers, ACM: [2] Behrens, Sandra; Alberts, Christopher; & Ruefle, Robin. Competency Lifecycle Roadmap: Toward Performance Readiness (CMU/SEI-2012-TN-020). Software Engineering Institute, Carnegie Mellon University, [3] Curtis, B., Hefley, W.E., and Miller, S. (2002). The People Capability Maturity Model: Guidelines for Improving the Workforce. Reading, MA: Addison Wesley Longman [4] Software Assurance Professional Competency Model, Department of Homeland Security, October [5] Information Assurance Workforce Improvement Program, DoD Directive , Department of Defense, December 19, [6] Information Technology Competency Model, Employment and Training Administration, Department of Labor, August [7] Graduate Reference Curriculum for Systems Engineering (GRCSE), version 0.5, Body of Knowledge and Curriculum to Advance Systems Engineering (BKCASE), Hoboken, NJ, USA: Stevens Institute of Technology, December ( [8] Hadfield, S.; Schweitzer, D.; Gibson, D.; Fagin, B.; Carlisle, M.; Boleng, J.; & Bibighaus, D. Defining, Integrating, and Assessing a Purposeful Progression of Cross-Curricular Initiatives into a Computer Science Program. Proceedings of the 41st ASEE/IEEE Frontiers in Education Conference. October [9] Hadfield, S. Integrating Software Assurance and Secure Programming Concepts and Mindsets into an Undergraduate Computer Science Program. Presented at Department of Homeland Security Software Assurance Forum. March 29, [10] Hilburn, T. et al, Software Engineering Competency Study: Final Report, Federal Aviation Administration, December 1998 [11] Hilburn, T. et al, Software Assurance Competency Model, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania. (forthcoming) [12] Watts S. Humphrey, Managing the Software Process, Addison Wesley, 1989 [13] Institute for Electrical and Electronic Engineering, Guide to the Software Engineering Body of Knowledge, IEEE, 2004
10 [14] Mead, Nancy R. et al, Software Assurance Curriculum Project, Volume I: Master of Software Assurance Reference Curriculum (CMU/SEI-2010-TR-005), Software Engineering Institute, Carnegie Mellon University, [15] Mead, Nancy R., Hilburn, Thomas B., and Linger, Richard C., Software Assurance Curriculum Project, Volume II: Undergraduate Course Outlines (CMU/SEI-2010-TR-019), Software Engineering Institute, Carnegie Mellon University, [16] Mead, Nancy R., Hawthorne, Elizabeth K., and Ardis, Mark, Software Assurance Curriculum Project, Volume IV: Community College Education (CMU/SEI-2011-TR-017), Software Engineering Institute, Carnegie Mellon University, [17] Moreno, Ana M. et al, Balancing Software Engineering Education and Industrial Needs, The Journal of Systems and Software, vol 85, pp , [18] NASA's Systems Engineering Competencies. Washington, DC, USA: US National Aeronautics and Space Administration (NASA), ( [19] Royce, Winston, "Managing the Development of Large Software Systems", Proceedings of IEEE WESCON 26 (August): 1 9 [20] A Framework for PAB Competency Models, Professional Advisory Board, IEEE Computer Society, Draft Version, [21] A Competency Model for Software Engineering Practitioners, Professional Advisory Board, IEEE Computer Society, Draft Version, [22] VanLeer, Mary, Systems Engineering Competency Development, Proceedings of the 5th Annual Conference on Systems Engineering Research, Stevens Institute of Technology, March 14-16, 2007.
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
SSECM: The Software Systems Engineering Competency Model. Agenda
SSECM: The Software Systems Engineering Competency Model prepared and presented by Richard E. (Dick) Fairley, PhD, CSDP Software and Systems Engineering Associates () SSECM STC 10 April 2013 slide 1 Agenda
An overview of GRCSE: Graduate Reference Curriculum for Systems Engineering
OPEN ACCESS World Congress on Engineering Education 2013 An overview of GRCSE: Graduate Reference Curriculum for Systems Engineering Massood Towhidnejad, Thomas B. Hilburn Department of Electrical, Computer,
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
The Software Engineering Competency Model (SWECOM)
The Software Engineering Competency Model (SWECOM) presented by Dick Fairley Software and Systems Engineering Associates (S2EA) [email protected] Copyright Dick Fairley 2014 slide 1 Presentation Agenda
An Information Assurance and Security Curriculum Implementation
Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Optimization of Software Quality using Management and Technical Review Techniques
Optimization of Software Quality using Management and Technical Review Techniques Inibehe Emmanuel Akpannah Post Graduate Student (MSc. Information Technology), SRM University, Chennai, India Abstract
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
Guidelines for Developing a Product Line Production Plan
Guidelines for Developing a Product Line Production Plan Gary Chastek John D. McGregor June 2002 TECHNICAL REPORT CMU/SEI-2002-TR-006 ESC-TR-2002-006 Pittsburgh, PA 15213-3890 Guidelines for Developing
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
Introduction to the OCTAVE Approach
Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee
CMMI: What do we need to do in Requirements Management & Engineering?
Colin Hood Page 1 of 11 : What do we need to do in Requirements Management & Engineering? Colin Hood HOOD Group February 2003 : What do we need to do in Requirements Management & Engineering?... 1 1 Abstract...
A Guide. to Assessment of Learning Outcomes. for ACEJMC Accreditation
A Guide to Assessment of Learning Outcomes for ACEJMC Accreditation Accrediting Council on Education in Journalism and Mass Communications, 2012 This guide explains ACEJMC s expectations of an assessment
Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11
Internal Audit Report ITS CHANGE MANAGEMENT PROCESS Report No. SC-11-11 March 2011 SANTA CRUZ: INTERNAL AUDIT March 31, 2011 MARY DOYLE Vice Chancellor Information Technology Re: Internal Audit Report
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Reaching CMM Levels 2 and 3 with the Rational Unified Process
Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Achieving a Step Change in Digital Preservation Capability
Essential Guide Achieving a Step Change in Digital Preservation Capability An assessment of Preservica using the Digital Preservation Capability Maturity Model (DPCMM) Executive Summary Nearly every organization
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Leveraging CMMI framework for Engineering Services
Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering
A Framework for Categorizing Key Drivers of Risk
A Framework for Categorizing Key Drivers of Risk Christopher J. Alberts Audrey J. Dorofee April 2009 TECHNICAL REPORT CMU/SEI-2009-TR-007 ESC-TR-2009-007 Acquisition Support Program Unlimited distribution
Factors that Influence the Occupational Health and Safety Curricula. Jeffery Spickett. Division of Health Sciences Curtin University Australia
Factors that Influence the Occupational Health and Safety Curricula Jeffery Spickett Division of Health Sciences Curtin University Australia 1.0 INTRODUCTION Occupational health and safety has undergone
NATIONAL CONTRACT MANAGEMENT ASSOCIATION STRATEGIC PLAN
NATIONAL CONTRACT MANAGEMENT ASSOCIATION STRATEGIC PLAN This plan addresses the association s vision, mission, value propositions, values strategies, and objectives. We will strive to implement these throughout
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
The Systems Engineering Body of Knowledge and Graduate Reference Curriculum
The Systems Engineering Body of Knowledge and Graduate Reference Curriculum David Olwell Naval Postgraduate School 777 Dyer Road (SE/OL BU220K) Monterey, CA 93943 [email protected] Alice Squires Stevens
CERT/CC Overview & CSIRT Development Team Activities
CERT/CC Overview & CSIRT Development Team Activities Georgia Killcrece CSIRT Development Team CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 October 2006
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Author Richard A. Caralli Principle Contributors James F. Stevens Charles M. Wallen, Financial Services Technology
CMMI Version 1.2. SCAMPI SM A Appraisal Method Changes
Pittsburgh, PA 15213-3890 CMMI Version 1.2 SCAMPI SM A Appraisal Method Changes SM CMM Integration, IDEAL, and SCAMPI are service marks of Carnegie Mellon University. Capability Maturity Model, Capability
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
Concept of Operations for the Capability Maturity Model Integration (CMMI SM )
Concept of Operations for the Capability Maturity Model Integration (CMMI SM ) August 11, 1999 Contents: Introduction CMMI Overview Concept for Operational Use of the CMMI Migration to CMMI Models Concept
Learning Outcomes Implementation Guidance - Revised Staff Questions & Answers Document
Committee: International Accounting Education Standards Board Meeting Location: IFAC Headquarters, New York, USA Meeting Date: November 4 6, 2015 SUBJECT: Learning Outcomes Implementation Guidance - Revised
The Software Development Life Cycle: An Overview. Last Time. Session 8: Security and Evaluation. Information Systems Security Engineering
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time Brief review of the testing process Dynamic Testing
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
How To Improve A Test Process
Certified Tester Expert Level Modules Overview Version 1.1, 12th April 2013 Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. Version 1.1 Page
PUBLIC ACCOUNTANTS COUNCIL HANDBOOK
PUBLIC ACCOUNTANTS COUNCIL HANDBOOK Adopted by the Public Accountants Council for the Province of Ontario: April 17, 2006 PART I: PROFESSIONAL COMPETENCY REQUIREMENTS FOR PUBLIC ACCOUNTING PART II: PRACTICAL
Blackhawk Technical College. Information Technology Services. Process Improvement Visioning Document
Blackhawk Technical College Information Technology Services Process Improvement Visioning Document December 12, 2008 Steven Davidson Chief Information Officer Blackhawk Technical College [email protected]
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process Richard A. Caralli James F. Stevens Lisa R. Young William R. Wilson May 2007 TECHNICAL REPORT CMU/SEI-2007-TR-012
A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering
Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES
Business Analyst to Business Architect
Business Analyst to Business Architect To Infinity... and Beyond! White Paper March 2010 Authors: Jack Hilty Cathy Brunsting Editor: Janice Koerber Copyright 2010 SentientPoint, Inc. All Rights Reserved
Secure Software Development Life Cycle Processes: A Technology Scouting Report
Secure Software Development Life Cycle Processes: A Technology Scouting Report Noopur Davis December 2005 Software Engineering Process Management Unlimited distribution subject to the copyright. Technical
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Pittsburgh Public Schools. We Dream Big. We Work Hard. We Promise. Promise-Readiness Corps
Pittsburgh Public Schools We Dream Big. We Work Hard. We Promise. Promise-Readiness Corps 1 Promise-Readiness Corps (PRC) Salary Plan: Additional Compensation: Residency: FLSA Status: Work Day: Work Year:
The Systems Security Engineering Capability Maturity Model (SSE-CMM)
The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development [email protected] 410-309-1780 Topics Why define security engineering
Software Architecture Professional Certificate
Software Architecture Professional Certificate The Software Architecture Professional Certificate program will equip you with state-of-the-art architecture practices and concepts. You will gain experience
Position Title: Management Info Chief. Working Title: Technical Project Management Section Chief
Position Title: Management Info Chief Working Title: Technical Project Management Section Chief This management position directs the operational activities of the Project Management Office whose mission
Incident Management Capability Metrics Version 0.1
Incident Management Capability Metrics Version 0.1 Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek April 2007 TECHNICAL REPORT CMU/SEI-2007-TR-008 ESC-TR-2007-008 CERT Program Unlimited distribution
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
Journal of Homeland Security and Emergency Management
Journal of Homeland Security and Emergency Management Volume 8, Issue 2 2011 Article 9 FUTURE OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT EDUCATION Professional Education for Emergency Managers William
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
Guidelines for Developing a Product Line Concept of Operations
Guidelines for Developing a Product Line Concept of Operations Sholom Cohen August 1999 TECHNICAL REPORT CMU/SEI-99-TR-008 ESC-TR-99-008 Pittsburgh, PA 15213-3890 Guidelines for Developing a Product Line
A Security Approach in System Development Life Cycle
A Security Approach in System Development Life Cycle (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. [email protected] (2) Dr.K.Alagarsamy,
Karunya University Dept. of Information Technology
PART A Questions 1. Mention any two software process models. 2. Define risk management. 3. What is a module? 4. What do you mean by requirement process? 5. Define integration testing. 6. State the main
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
HKIHRM HR PROFESSIONAL STANDARDS MODEL
HKIHRM HR PROFESSIONAL STANDARDS MODEL Creating Values For You and For Organisations Setting Standards Recognising s ABOUT HKIHRM The Hong Kong Institute of Human Resource Management (HKIHRM) is the leading
RE: PCAOB Rulemaking Docket Matter No. 004 Statement Regarding the Establishment of Auditing and Other Professional Standards
May 12, 2003 Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, D.C. 20006-2803 RE: PCAOB Rulemaking Docket Matter No. 004 Statement Regarding the Establishment
Guidelines and Proposal for the Master of Arts (MA) or Master of Science (MS) in Interdisciplinary Studies Degrees
Guidelines and Proposal for the Master of Arts (MA) or Master of Science (MS) in Interdisciplinary Studies Degrees California State University, Fresno Division of Graduate Studies SECTION I GUIDELINES
AC 2010-741: ASSOCIATE SYSTEMS ENGINEERING PROFESSIONAL (ASEP) CERTIFICATION: A CREDENTIAL TAILORED FOR STUDENTS AND JUNIOR ENGINEERS
AC 2010-741: ASSOCIATE SYSTEMS ENGINEERING PROFESSIONAL (ASEP) CERTIFICATION: A CREDENTIAL TAILORED FOR STUDENTS AND JUNIOR ENGINEERS Steve Walter, Indiana University-Purdue University, Fort Wayne Dr.
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Initial Professional Development Technical Competence (Revised)
IFAC Board Exposure Draft July 2012 Comments due: November 1, 2012 Proposed International Education Standard (IES) 2 Initial Professional Development Technical Competence (Revised) COPYRIGHT, TRADEMARK,
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
MODERNISING HIGHER EDUCATION
MODERNISING HIGHER EDUCATION Strategic commitment and practical application Brahea Centre at the University of Turku Bridging higher education and the society Introduction Modernisation of higher education
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Mary Anne Herndon, SAIC Robert Moore, SAIC Mike Phillips, Software
