You are here:

Security Architecture
and Design

Security development lifecycle
Security consulting and training
Continuous testing and SecDevOps
Threat and risk analysis

Security in software development

Cybersecurity in software development (Security Development Lifecycle) includes taking security aspects into account when planning application systems. Our IT experts provide conceptual support in the following areas of software development:

  • Creation or evaluation of requirements for a software system (Requirements Engineering)
  • Analysis and assessment of risks for the software system (threat modeling)
  • Evaluation of (existing) software solutions and architectures
  • Integration of IT security into the software development lifecycle (SDLC)
  • Integration of IT security in Continuous Integration (CI)/ Continuous Delivery (CD)

Security consulting and training

The aim of our experts in the field of security consulting and training is to impart content to build competencies in the field of IT security:

  • The security consulting focuses on specific threats and the evaluation of currently implemented measures and, if necessary, their further development. The consulting work usually remains on a conceptual level and offers a basis as a decision-making aid for executives, management and software architects.
  • The security training area follows a technical approach by conveying selected training content in order to be able to use the acquired knowledge and skills to safely solve everyday tasks and challenges (e.g. secure programming). The training courses are primarily aimed at developers (teams), administrators and technical staff related to IT security.

Continuous testing / SecDevOps

Our approach to Continuous Testing and SecDevOps focuses on providing a seamless, automated process that enables security and quality controls to be efficiently integrated into the software development lifecycle. We offer expertise in setting up and optimizing CI/CD pipelines, selecting and implementing appropriate security tools, and training teams to create and maintain security awareness.

Our experts provide support and implementation in the following key areas:

  • automation of security tests
  • Integration in CI/CD
  • Static and dynamic code analysis
  • training and awareness-raising

Threat and risk analysis

Our threat and risk analyses provide companies with a sound basis for strengthening their security policies. We use proven methods and tools to conduct in-depth analyses that enable our customers to effectively plan and implement their security strategies. Our experts support the entire process chain from identification to risk mitigation.

Our experts provide support and implementation in the following key areas:

  • threat and risk analysis
  • Threat Intelligence
  • vulnerability analysis
  • risk matrix
  • security policies and standards
  • Proactive security measures

Sources

[1] The OWASP® Foundation, OWASP Application Security Verification Standard, https://owasp.org/www-project-application-security-verification-standard/

[2] The OWASP® Foundation, Threat Modeling Process, https://owasp.org/www-community/Threat_Modeling_Process

[3] Microsoft, Security Development Lifecycle, https://www.microsoft.com/en-us/securityengineering/sdl