Techniques, Practices and Reference guides: Security Patterns, Software Patterns,
Antipatterns and Best Practices [20].
Main Roles: Security Engineer, Security Architects, Security Expert, Security
Developer, Integrator Engineer, and D&D Team.
Test Stage. After integrating the system’s hardware (HW) and SW components, it is
necessary to ensure that they function correctly and that they fulfil that which is
indicated in the previous stage, before being handed over to the final user.
Activities: The activities in this stage are:
• A1: Design of operation tests. The guidelines concerning how to act are defined to
verify that the functioning of the system which has been developed is correct
(communication, performance, accessibility tests, etc.).
• A2: Execution of operation tests. The correct functioning of the system is verified,
in addition to verifying that the pieces of HW and SW of which it is composed are
well developed and configured, and that connectivity exists between them.
• A3: Design the Security Test Patterns. The reusable patterns repository is by
relating the Security Patterns to their associated Security Test Patterns, if they do
not yet exist. The following will be defined in these patterns: Test to be carried out;
Planning of Test; Personnel who will carry out the Test; And tools, resources and
mechanisms necessary to carry out the security Test in the infrastructure proposed
by the pattern. The Test will be carried out on the basis of the vulnerabilities of the
technology, the operative systems, the SW, the HW, etc. The tests will consist of
ethical hacking, intrusion tests, error and code quality tests, fault tolerance, backup
systems, verification of militarization of machines and operative systems, and
verification of activity register logs.
• A4: Execution of security tests. The security tests defined in the previous stage are
carried out to certify that the system is secure. These tests are carried out in the
setting designed for this purpose – the unified test setting.
• A5: Evaluation of tests. The creation of a report containing the results of the tests
that certify that the system which has been developed is secure. In the case of
discovering any faults in the configuration, or in the code or vulnerability in the
system, the infrastructure is reviewed in an iterative manner by following the
activities from the previous stage.
• A6: Approval of the system developed. Once the system has been developed and
both its functioning and security have been verified, the system is certified as being
ideal to satisfy the business model proposed in the project. Later, the system will
be promoted to the production setting and will be available to the final user.
• A7: Monitoring the system. The system is now monitored on the basis of the
guidelines defined by the Maintenance Pattern in order to discover any future
anomalies, faults, output problems, vulnerabilities or deficiencies occasioned by
the passage of time and the evolution of both the HW and SW systems and the
tactics and tools used by attackers.
Input artifacts: Output artifact of the Construction stage, Technical and Security
infrastructure manual, Security Patterns and Reusable Patterns Repository.
Output artifacts: Test Model, Test Patterns, User Manuals, and Test Manuals and
Tested Secure system.
Techniques, Practices and Reference guides: Monitoring, Ethical Hacking,
Hardening, Test reviews, and Misuse Patterns, Test Patterns.
66