Security in Development: The IBM Secure Engineering Framework Security in Development: The IBM Secure Engineering Framework

Security in Development: The IBM Secure Engineering Framework

Publisher Description

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security.

As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973:

IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads.

This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page.

The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company.

In this IBM Redguide™ publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered.

IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.

GENRE
Computers & Internet
RELEASED
2018
December 17
LANGUAGE
EN
English
LENGTH
26
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
196.8
KB

More Books Like This

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014
Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition
2014
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
CISM Certified Information Security Manager All-in-One Exam Guide CISM Certified Information Security Manager All-in-One Exam Guide
2018
Official (ISC)2 Guide to the CSSLP CBK, Second Edition Official (ISC)2 Guide to the CSSLP CBK, Second Edition
2013
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022

Customers Also Bought

Liberty in IBM CICS: Deploying and Managing Java EE Applications Liberty in IBM CICS: Deploying and Managing Java EE Applications
2018
ABCs of z/OS System Programming Volume 10 ABCs of z/OS System Programming Volume 10
2016
ABCs of IBM z/OS System Programming Volume 2 ABCs of IBM z/OS System Programming Volume 2
2018
ABCs of IBM z/OS System Programming Volume 1 ABCs of IBM z/OS System Programming Volume 1
2014
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011