Intro to Platform Security
Intro to Platform Security
Security
Week 2 - 3
Jerome L. Mamansag
Instructor
OVERVIEW
Overview of Platform
Security
Importance of Platform
Security in the Digital
Landscape
Security Testing
CIA Triad
Overview of
Platform Security
Platform security refers to the comprehensive
security architecture, tools, and processes
implemented to safeguard an entire computing
platform.
It takes a holistic approach, protecting all
components and layers within the platform from
hardware and software to network, storage, and
applications.
Unlike traditional layered security where each
component manages its own security, platform
security offers a unified central system for holistic
protection.
‘’Platform Security is a collection of tools, processes, and an
umbrella architecture that protects an enterprise's whole
computing platform.
Platform security typically relies on a unified set of hardware and
software to safeguard both traditional IT infrastructure and
software-defined hardware, storage, and network components, as
well as the operating systems and applications that run on those
platforms.’’
https://www.vmware.com/topics/platform-security
Cloud platforms: Major cloud providers like AWS, Microsoft Azure, and
Google Cloud Platform offer built-in platform security features,
protecting infrastructure, workloads, and data. (Amazon, Microsoft Azure
and Google Cloud).
Testing can help reduce the risks Organizations can use testing to
associated with software failures. identify areas for improvement in their
Organizations can avoid costly recalls, development processes. Teams can
reputational damage, and financial use test results to identify trends,
losses if potential problems are root causes of defects, and
identified and addressed early on. implement measures to prevent
similar issues in the future.
When to perform Security testing?
A more effective strategy is to incorporate security testing throughout the
entire Software Development Life Cycle (SDLC). This involves integrating
security considerations into each phase of development, from requirements
gathering to deployment.
SECURITY TESTING
Loop Testing
Loops are widely used and fundamental to many algorithms, so
their testing is critical. Errors frequently occur at the beginning and
end of loops.
Process White Box Testing
Input: Requirements, Functional
specifications, design documents,
source code.
Processing: Performing risk analysis
to guide through the entire process.
Proper test planning: Designing test
cases to cover the entire code.
Execute rinse-repeat until error-
free software is reached. Also, the
results are communicated.