Microsoft Security Development Lifecycle (SDL) for Line-of-Business Applications

Introduction

Pre-SDL Requirements: Security Training for LOB

Phase 1: Requirements for LOB

Phase 2: Design for LOB

Phase 3: Implementation for LOB

Phase 4: Verification for LOB

Phase 5: Release for LOB

Content Disclaimer

This documentation is not an exhaustive reference on the SDL process as practiced at Microsoft. Additional assurance work may be performed by product teams (but not necessarily documented) at their discretion. As a result, this example should not be considered as the exact process that Microsoft follows to secure all products.

This documentation is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it.

This documentation does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.

© 2012 Microsoft Corporation. All rights reserved.

Licensed under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported