I have never met Hoikas. Maybe he IS a primitive gorilla!
Back to security...
It is surprising how little development teams know about it. They are often geniuses and can argue endlessly about performance and optimization and algorithms, but ask them about security and they are useless. The most likely answer you'll get is "Isn't that something for the network guys to worry about?".
My team has audited systems from several sources (it is a fast growing market) and we are flabbergasted to find obvious flaws, the kind you find about by typing "Java security" or ".net security" on Google.
Last week, on one huge system that will process civil servants pensions and will have an internet portal, we found 58 severe flaws. I'm not talking obscure code tweaking here, I'm talking common sense best practices like "Don't keep system passwords in clear text in flat files on the web server". That's just one of the 58, and we found lots of such passwords. The dev team had no idea what we were talking about.
We vetoed deployment. This was not popular with the big consultant firm that had just spent 3 years developing it at a cost of millions. The look on the face of the project manager was something to behold. The customer is still trying to determine if the system can be corrected or if it would be cheaper to scrap it altogether and begin again. I say scrap.
What is even more amazing is these things we found:
- There was no requirement about security;
- no risk assessment was done;
- no security advisor was assigned to the dev team;
- no security training was offered to the dev team;
- no framework was available;
- no security test was included in the test plan;
- critical functions were developed by juniors with little supervision and no peer review.
