Secure and Resilient Software 1st Edition Mark S. Merkow instant download
Secure and Resilient Software 1st Edition Mark S. Merkow instant download
https://ebookgate.com/product/secure-and-resilient-software-1st-
edition-mark-s-merkow/
https://ebookgate.com/product/architecting-secure-software-
systems-1st-edition-asoke-k-talukder/
ebookgate.com
https://ebookgate.com/product/resilient-liberalism-in-europe-s-
political-economy-1st-edition-vivien-a-schmidt/
ebookgate.com
https://ebookgate.com/product/android-software-development-a-
collection-of-practical-projects-1st-edition-mark-wickham/
ebookgate.com
https://ebookgate.com/product/engineering-secure-devices-dominik-
merli/
ebookgate.com
Adaptive Dynamic and Resilient Systems 1st Edition
Niranjan Suri
https://ebookgate.com/product/adaptive-dynamic-and-resilient-
systems-1st-edition-niranjan-suri/
ebookgate.com
https://ebookgate.com/product/strong-borders-secure-nation-
cooperation-and-conflict-in-china-s-territorial-disputes-m-taylor-
fravel/
ebookgate.com
https://ebookgate.com/product/cisco-secure-intrusion-detection-
system-1st-edition-earl-carter/
ebookgate.com
https://ebookgate.com/product/the-resilient-clinician-1st-edition-
robert-j-wicks/
ebookgate.com
https://ebookgate.com/product/google-compute-engine-managing-secure-
and-scalable-cloud-computing-1st-edition-marc-cohen/
ebookgate.com
Information Technology / Programming Languages
Raghavan
Merkow
Developing more secure and resilient software has to be an integral part of the design and
the implementation of an application and not an afterthought. … This book pulls together the
state of the art in thinking about this important issue in a holistic way with several examples. It
takes you through the entire lifecycle from conception to implementation and highlights where
methodologies like the Microsoft Security Development Lifecycle can play a significant role in
improving the security and reliability of your software.
—Doug Cavit, Chief Security Strategist, Microsoft Corporation
… provides the reader with the tools necessary to jump-start and mature security within
… full of useful insights and practical advice from two authors who have lived this process.
… a tactical application security roadmap that cuts through the noise and is immediately
applicable to your projects. … You’ll learn how security evolves from threats to security
requirements, through security services like OWASP ESAPI, into security architecture, and
then into security testing and analysis leveraging OWASP ASVS. Highly recommended … .
—Jeff Williams, Aspect Security CEO and Volunteer Chair of the OWASP Foundation
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides
a comprehensive set of requirements for secure and resilient software development and
operation. It supplies documented test cases for those requirements as well as best practices
for testing nonfunctional requirements for improved information assurance. This resource-
rich book includes:
• Pre-developed nonfunctional requirements that can be reused for any software
development project
• Documented test cases that go along with the requirements and can be used
to develop a Test Plan for the software
• Testing methods that can be applied to the test cases provided
• A CD with all security requirements and test cases as well as MS Word versions
of the checklists, requirements, and test cases covered in the book
K12954
ISBN: 978-1-4398-6621-4
90000
w w w. c rc p r e s s . c o m
9 781439 866214
www.auerbach-publications.com
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Contents
Preface xi
How This Book Is Organized xii
Acknowledgements xix
From Mark Merkow xvii
From Laksh Raghavan xviii
Chapter 1 Introduction 1
1.1 Secure and Resilient 1
1.2 Bad Design Choices Led to the Vulnerable
Internet We Know Today 2
1.3 HTTP Has Its Problems, Too 4
1.4 Design Errors Continue Haunting Us Today 6
1.5 Requirements & Design: The Keys to a Successful
Software Project 7
1.6 How Design Flaws Play Out 10
1.6.1 DNS Vulnerability 10
1.6.2 The London Stock Exchange 10
1.6.3 Medical Equipment 11
1.6.4 Airbus A380 12
1.7 Solutions Are In Sight! 12
1.8 Notes 13
v
MerkowTOC.fm Page vi Sunday, August 14, 2011 11:17 AM
vi Contents
Contents vii
viii Contents
Contents ix
9.4.1
Automated Reviews Compared with
Manual Reviews 226
9.4.2 Automated Source Code Analysis
Tools—Deployment Strategy 226
9.4.3 IDE Integration for Developers 227
9.4.4 Build Integration for Governance 227
9.4.5 Automated Dynamic Analysis 228
9.4.6 Limitations of Automated Dynamic
Analysis Tools 229
9.4.7 Automated Dynamic Analysis
Tools—Deployment Strategy 229
9.4.8 Developer Testing 230
9.4.9 Centralized Quality Assurance Testing 230
9.5 Penetration (Pen) Testing 231
9.5.1 Gray Box Testing 232
9.6 Summary 232
9.7 References 232
Index 251
This page intentionally left blank
Preface.fm Page xi Sunday, August 14, 2011 11:17 AM
Preface
xi
Preface.fm Page xii Sunday, August 14, 2011 11:17 AM
xii Preface
Application/applet developers
Software designers
Web application systems analysts
Software support personnel
Payment card industry payment application (PA) standard and
data security standard (DSS) auditors
Security architects
Enterprise architects
Application development department managers
IT security professionals and consultants
Project managers
Application software security professionals
Instructors and trainers for secure application development tech-
niques and practices
Secure and Resilient Software: Requirements, Test Cases, and Testing xiii
then goes into the next level of detail for converting requirements into
application design choices.
Chapter 8 moves into the testing phase of the SDLC by providing you
test cases that are related to the security requirements we provided in Chap-
ter 4. These test cases are intended for you to use when developing a testing
plan, which is then used for comprehensive testing of both the application’s
functional requirements and its security requirements.
Chapter 9 offers you some tools and best practices for testing applica-
tion software for assurance that security features are present and working as
intended in candidate release applications. It provides an inside look at the
OWASP Application Security Verification Standard (ASVS) for normalizing
the range of coverage and level of rigor for performing Web application
security verification. Chapter 10 then wraps up the book with a framework
and roadmap to help you implement what you learned in Chapters 1
through 9.
For updates to this book and ongoing activities of interest to the secure
and resilient software community, please visit www.srsdlc.com.
This page intentionally left blank
Preface.fm Page xv Sunday, August 14, 2011 11:17 AM
Requirements
In the RequirementTemplates folder on the CD you will find the 93
requirements organized by the security topics they reference. Each require-
ment family has its own directory and within each directory are separate MS
Word template files along with a Directory file that contains the require-
ment file name and its description:
Export them in any file format that MS Word supports into your
Requirements Management System
Copy and update them for your Business Requirements Document
(BRD), Master Requirements Document (MRD, or whatever you
use to specify system functional and nonfunctional requirements)
Test Cases
In the TestCasesTemplates folder on the CD you will find the 73 test cases
and a directory for them. Each test case supports one of more security
requirements from Chapter 4.
You can use the test case templates to create your customized testing plans
for your software based on the techniques described in Chapter 10. These
test cases can be combined and integrated into your own test plan docu-
ment and imported into your testing platform (if it is supported).
Checklists
In the Checklists folder on the CD you will find electronic versions of:
Mark S. Merkow, CISSP, CISM, CSSLP works at PayPal Inc. (an eBay
company) in Scottsdale, Arizona, as Manager of Information Security Poli-
cies, Standards, Training, and Awareness in the Information Risk Manage-
ment area. Mark has more than 35 years of experience in information
technology in a variety of roles, including applications development, sys-
tems analysis and design, security engineering, and security management.
Mark holds a masters degree in decision and info systems from Arizona
State University (ASU), a masters of education in distance learning from
ASU, and an undergraduate degree in computer info systems from ASU. In
addition to his day job, Mark engages in a number of other extracurricular
activities, including consulting, course development, online course delivery,
and writing columns and books on information technology and informa-
tion security.
Mark has authored or coauthored ten books on IT and is a contribut-
ing editor on four others.
Mark remains very active within the information security commu-
nity, working in a variety of roles for the Financial Services Information
Sharing and Analysis Center (FS-ISAC), the Financial Services Technol-
ogy Consortium (FSTC), and the Financial Services Sector Coordinating
Council (FSCCC) on Homeland Security and Critical Infrastructure Pro-
tection. He is the chairman of the Education Committee for the FS-ISAC
and is a founding member of the Research and Development Committee
of the FSSCC.
Lakshmikanth Raghavan, CISM, CRISC (Laksh) works at PayPal Inc. (an
eBay company) as Staff Information Security Engineer in the Information
Risk Management area, specializing in application security. Laksh has more
than ten years of experience in the areas of information security and infor-
mation risk management, and has provided consulting services to Fortune
500 companies and financial services companies around the world.
xvii
Preface.fm Page xviii Sunday, August 14, 2011 11:17 AM
Acknowledgements
xix
Preface.fm Page xx Sunday, August 14, 2011 11:17 AM
xx Acknowledgements
Chapter 1
Introduction
Economic costs of faulty software in the United States range in the tens of
billions of dollars every year and represent about one percent of the U.S.
gross domestic product (GDP).1
And things are getting worse.
In efforts to “do something” about the problem, we’ve gone from ignor-
ing it, to acknowledging its existence, and lately to testing for vulnerabilities
that we’re certain we’ll find. Rather than trying to test-in quality, would it
not be better to build it in from the start?
Secure and resilient application software can only emerge from a soft-
ware development lifecycle (SDLC) that treats nonfunctional requirements
(NFRs) and quality requirements as a core element of every phase, as well as in
postdeployment. By mandating security and resilience within the SDLC
itself and ensuring that requirements related to security and resilience are
treated as equal citizens with all functional requirements, managers can rest
better at night knowing their infrastructure and applications are continu-
ously working as their defender rather than their enemy.
In our book entitled Secure and Resilient Software Development,2 we
advocated an environment in which software security and resilience
require a holistic, comprehensive approach. The primary goal of this book
is to help people understand that when NFRs are neglected at program
specification time, they will not magically appear when the application
undergoes testing.
Failing to specify any desirable quality features up front is a surefire recipe
for guaranteeing their absence!
1
Chap1.fm Page 2 Sunday, July 31, 2011 10:41 AM
2 Introduction
Resilient and secure code is neither cheap nor easy to attain, but unless
it’s thoroughly considered from the start of a development project till the
very end, it’s completely unattainable. Bolting on security to an insecurely
developed application will not make it secure or resilient—it will only make
it more complicated to understand, maintain, and operate.
Testing for security features and testing for security bugs in the later
phases of the SDLC while ignoring security and resilience NFRs in all ear-
lier SDLC phases will not produce a secure and resilient application. Just as
quality cannot be tested in to products, high-quality application develop-
ment requires stringent attention from the very start.
A common recurring theme in software development shops is the diffi-
culty in specifying what’s needed at the start of a development effort for
security and resilience. This book is intended to help reduce this difficulty
and help systems analysts, designers, and would-be users of the application
to document these NFRs by reusing and customizing what we offer here.
two systems to use for communicating over the Internet. All connections on
the Internet happen using network sockets in a simple four-step process:
With FTP, it’s a little more complicated. Figure 1.1 and the list below
show the steps required for using the FTP protocol:
Take a look at steps 5 and 6 in the list. Does it seem odd to you that the
protocol specifies having the client open the port and having the server con-
nect back to it? When the host-to-host protocol was written, data could
only be transmitted in one direction over a socket, and the same was true
with NCP. Once TCP/IP was developed, this problem was solved and data
could travel in both directions on a socket, but FTP was never rewritten to
take advantage of that feature.
FTP continued to work the way it always did, and no one thought to
redesign it. So why does this matter in the long run?
The unexpected effect was that FTP inadvertently created the need for
a firewall! In the early days of TCP/IP, existing router technologies could not
Chap1.fm Page 4 Sunday, July 31, 2011 10:41 AM
4 Introduction
handle the odd “callback” behavior of FTP (steps 7 and 8) because corpora-
tions wanted to control and prevent random people the outside from con-
necting back into their networks.
Engineers, including Marcus Ranum, began developing firewall sys-
tems. In 1991, Ranum sold his first firewall for $195,000. This firewall
industry grew into a $100 million industry by 1997; by 2009, network edge
defense technology (with firewalls that added more and more functions like
spam filtering) was estimated to be a billion-dollar industry!
In hindsight, it would have taken a couple of hours for a good pro-
grammer to fix FTP back in 1975. Since then, the industry has spent mil-
lions of dollars on this problem, and making it worse still—FTP remains in
use with the same problems!
6 Introduction
The article explains how critical requirements are within the SDLC.
Consider a purchasing system that automates the ordering, billing, and
shipping of parts. A salesperson can input a customer’s order, have it auto-
matically check the pricing and contract requirements, and arrange to have
the parts and invoice sent to the customer from the warehouse.
The requirements for the system specify four basic steps.
8 Introduction
10 Introduction
Back in 1986, the London Stock Exchange decided9 to automate its system
for settling stock transactions. Seven years later, after spending $600 mil-
lion, it scrapped the Taurus system’s development, not only because the
design was excessively complex and cumbersome, but also because the man-
agement of the project was, in the words of one of its own senior managers,
“delusional.” As investigations revealed, no one wanted to know the true
status of the project, even as problems stacked up, deadlines were missed,
and costs soared.
Chap1.fm Page 11 Sunday, July 31, 2011 10:41 AM
12 Introduction
The Airbus A380, the largest passenger airliner in the world, was also bitten
by bad software. In a Pan-European project12 to build the world’s biggest
passenger plane, you might expect the language barriers between manage-
ment and engineers, but you’d hope the computers at least would speak the
same language.
In the spring of 2005, however, just as the Airbus A380 was taking
shape in hangars outside Toulouse, France, engineers came across a huge
software issue that reportedly cost the company $6 billion by delaying the
first flight by two years.
The French production facility had been using the latest version of the
industry standard computer-aided design (CAD) software, CATIA 5, for its
CAD designs. The Germans, on the other hand, had worked in CATIA 4,
which handles 3D objects differently.
When they tried to match up their halves of the plane, it was like trying
to weld the front of a Chevrolet Camaro to the back of a Cadillac Escalade.
The biggest problem was that the wiring plans were completely incompati-
ble. Subtle differences in the software meant mismatched connections
needed rerouting to connect the two disparate halves of the plane.
Even when developers wrote code to translate between the two ver-
sions, complications remained, with engineers pointing out that there was
insufficient space to carry power cables far enough away from signal wires to
prevent interference.
If you’re wiring one plug, a couple of late changes to a wiring diagram
isn’t a major issue, but with the A380’s 530 km of cabling, more than
100,000 individual wires, and 40,000 connectors, a single change has a neg-
ative cascading effect.
The list of problems could go on and on to fill all the pages of this
book. But, what we’re looking for are solutions that every software designer,
developer, architect, and tester can use to make their own software secure
and resilient.
1.8 Notes
1. “The Economic Impacts of Inadequate Infrastructure for Soft-
ware Testing,” National Institute of Standards & Technology,
accessed March 10, 2011, www.nist.gov/director/planning/
upload/report02-3.pdf.
2. Mark S. Merkow & Lakshmikanth Raghavan, Secure and Resil-
ient Software Development (CRC Press, 2010).
3. “TEDxMidAtlantic: Marcus Ranum,” YouTube, accessed
December 19, 2010, www.youtube.com/
watch?v=o59mQhBiUo4.
4. “Firesheep,” codebutler [blog], accessed November 17, 2010,
http://codebutler.com/firesheep.
5. “Web Applications See Sharp Rise In Attacks,” Information Week,
accessed April 12, 2011, www.informationweek.com/news/secu-
rity/vulnerabilities/ showArticle.jhtml?arti-
cleID=229400808&cid=RSSfeed_IWK_News,
and
“Reducing Risk through Requirements-Driven Quality Manage-
ment: An End-to-End Approach,” HP Software Customer Con-
nection, accessed April 11, 2011, http://
viewer.media.bitpipe.com/1000733242_857/1181846419_126/
74536mg.pdf.
Chap1.fm Page 14 Sunday, July 31, 2011 10:41 AM
14 Introduction
Chapter 2
Nonfunctional
Requirements (NFRs) in
Context
Throughout this book, we have bound security and resilience together
because, in many cases, when you’re using a defensive software development
methodology to meet security objectives, resilience tags along for the ride.
Examples include improved reliability, rapid recoverability, and simplified
portability. Other NFRs require deliberate attention and relate to both the
application itself and the environment under which your applications run.
Keep in mind the following working definition of nonfunctional
requirements as you proceed through the book:
NFR: A software requirement that describes not what the software will
do but how the software will do it-for example, software performance
requirements, software external interface requirements, software design
constraints, and software quality attributes.1
In Chapter 2, you will learn about the model for System Quality
Requirements Engineering (SQUARE) as well as what constitutes a good
requirement description.
15
Chap2.fm Page 16 Sunday, July 31, 2011 10:41 AM
1. Agree on definitions
2. Identify security goals
3. Develop artifacts to support security requirements definition
4. Assess risks
5. Select elicitation technique(s)
6. Elicit security requirements
7. Categorize requirements
8. Prioritize requirements
9. Inspect requirements
1. Agree on definitions
2. Identify assets and security goals
3. Perform risk assessment
4. Elicit security requirements
5. Prioritize requirements
Agreement is the initial step that the requirements engineering team and
stakeholders undergo. They must first agree on a common set of terminology
and definitions. The process is carried out through a set of interviews and
guarantees effective and clear communication throughout the requirements
Chap2.fm Page 17 Sunday, July 31, 2011 10:41 AM
engineering process. This involves using public resources, such as the Soft-
ware Engineering Body of Knowledge (SWEBOK) [IEEE 05], the IEEE
610.12 Standard Glossary of Software Engineering Terminology [IEEE 90],
and Wikipedia.
Agreement also resolves ambiguity and differences in perspective. The
exit criteria for this step are a documented set of definitions. Typical exam-
ples are access control (ACL), antivirus software, artifacts, assets, control,
attacks, audit information, authentication, availability, back doors,
breaches, brute force, buffer overflow, cache cramming, cache poisoning,
confidentiality, nonrepudiation, denial-of-service (DoS), intrusion, mal-
ware, and so on.
Identifying assets that need protection in the system and their correspond-
ing security and quality goals is the next objective. Initially, different stake-
holders will have different security and quality goals. Development teams
need to formally agree on a set of prioritized security goals for the project.
Without overall security goals for the project, it is impossible to identify the
priority and relevance of any security and quality requirements that are gen-
erated. The quality goals of the project must be in clear support of the
project’s overall business goal, which also must be identified and enumer-
ated in this step.
Once the goals of the various stakeholders are identified, they must be
reviewed, prioritized, and documented. In the absence of consensus, an
executive decision may be needed to prioritize the goals.
The exit criteria for this step is to document a single business goal for the
project and several prioritized security and quality goals for the overall soft-
ware system.
This step begins with identification of the vulnerabilities and threats that
face the system, the likelihood that the threats will materialize as real
attacks, and any potential consequences of an attack. Without a risk assess-
ment, organizations may be tempted to implement security requirements or
countermeasures without any logical rationale.
Once the threats have been identified by the risk assessment method,
they must be classified according to their likelihood. These will aid in prior-
itizing the security requirements generated at a later stage. For each threat
Chap2.fm Page 18 Sunday, July 31, 2011 10:41 AM
Prior to this step, the requirements engineering team must select an elicita-
tion technique that is suitable for the client organization and project. Multi-
ple techniques may work for the same project. The difficulty with selecting
a technique is choosing one that can adapt to the number and expertise of
the stakeholders, the size and scope of the client project, and the expertise of
the requirements engineering team.
CMU has done an extensive evaluation and analysis of the different
types of elicitation methods and has shown that the Accelerated Require-
ments Method (ARM) has been successful for eliciting security require-
ments. The evaluation criteria include:
In most cases, the development team will be unable to implement all of the
nonfunctional requirements due to the lack of time and/or resources, or
due to changes in the goals of the project. The purpose, then, of this step in
the SQUARE process is to prioritize the nonfunctional requirements, so
that the stakeholders can choose which requirements to implement and in
which order.
During prioritization, some of the requirements may be deemed
entirely infeasible to implement. In such cases, the requirements engineer-
Chap2.fm Page 21 Sunday, July 31, 2011 10:41 AM
ing team has a choice; completely dismiss the requirement from further
consideration, or document the requirement as “future work” and remove it
from the draft set of project requirements. This decision should be made
after consulting with all the stakeholders and after leadership approvals.
Characteristic Explanation
Cohesive The requirement addresses one and only one thing.
Complete The requirement is fully stated in one place with no miss-
ing information.
Consistent The requirement does not contradict any other require-
ment and is fully consistent with all authoritative external
documentation.
Correct The requirement meets all or part of a business or resil-
ience need as authoritatively stated by stakeholders.
Current The requirement has not been made obsolete by the pas-
sage of time.
Externally The requirement specifies a characteristic of the product
Observable that is externally observable or experienced by the user.
Feasible The requirement can be implemented within the con-
straints of the project.
Chap2.fm Page 22 Sunday, July 31, 2011 10:41 AM
Characteristic Explanation
Unambiguous The requirement is stated concisely, without unnecessary
technical jargon, acronyms, or other esoteric terms or
concepts. The requirement statement expresses objective
fact, not subjective opinion. It is subject to one and only
one interpretation. Vague subjects, adjectives, preposi-
tions, verbs, and subjective phrases are avoided. Nega-
tive statements and compound statements are not used.
Mandatory The requirement represents a stakeholder-defined char-
acteristic or constraint.
Verifiable Implementation of the requirement can be determined
through one of four possible methods: inspection, analy-
sis, demonstration, or test. If testing is the method needed
for verifiability, the documentation should contain a sec-
tion on how a tester might go about testing for it and
what results would be considered passing.
2.3 Summary
There’s no question that deriving nonfunctional requirements in software
development projects can be a daunting and enormous task that requires
dozens of labor-hours from a cross-section of people who have a stake in the
Chap2.fm Page 23 Sunday, July 31, 2011 10:41 AM
road, where maintenance, support, and operational costs quickly negate any
benefits the software was planned to provide.
In Chapter 2 you learned about CMU’s SQUARE methodology for
deriving NFR and what constitutes well-developed and well-written NFRs.
In Chapter 3, we’ll begin to peel the onion, first looking at resilience
and software quality categories of NFRs and cover requirements related to
the application software and the operating environment. Chapter 4 then
digs into security NFRs for applications and Chapter 5 into security infra-
structure services for the operating environment.
2.4 Notes
1. John Mylopoulos, Lawrence Chung, Brian A. Nixon, and Eric
Yu. Non-functional requirements in software engineering, Univer-
sity of Texas Dallas. accessed February 22,2011, www.utdal-
las.edu/~chung/BOOK/book.html.
2. “SQUARE Instructional Materials,” Software Engineering Insti-
tute, accessed February 22, 2011, www.cert.org/sse/square/
square-description.html.
3. “Requirements Elicitation Case Studies Using IBIS, JAD, and
ARM,” Build Security In, accessed February 23, 2011, https://
buildsecurityin.us-cert.gov/bsi/articles/best-practices/require-
ments/532-BSI.html.
4. “Detail Misuse Cases,” OWASP.org, accessed February 27, 2011,
www.owasp.org/index.php/Detail_misuse_cases.
5. “Architecture Resources for Enterprise Advantage.” Breedmeyer
Consulting Web site, accessed February 27, 2011,
www.ewita.com/newsletters/10023Files/NonFunctReq.PDF.
This page intentionally left blank
Other documents randomly have
different content
The Act of the Lords of Councell at Edinburgh.
August 30, 1639, containing the Answer of the
preceding Supplication.
T
HE which day, in presence of the Lord Commissioner and the
Lords of Privie Councell, compeired personally John Earle of
Rothes; James Earle of Montrose; John Lord Lowdoun; Sir George
Stirling of Keir, Knight; Sir William Douglas of Cavers, Knight; Sir
Henry Wood of Bonytoun, Knight; John Smyth, Burgesse of
Edinburgh; Mr Robert Barclay, Provest of Irwing; Mr Alexander
Henderson, Minister at Edinburgh; and Mr Archbald Johnstoun, Clerk
to the Generall Assembly; and, in the name of the present sitting
Generall Assembly, gave in to the Lord Commissioner, and Lords of
Privie Councell, the Petition above written; Quhilk being red, heard,
and considerit be the said Lord Commissioner and Lords of Privie
Counsell, they have ordainit, and ordains the samen to be insert and
registrat in the books of Privie Counsell, and, according to the desyre
thereof, ordains the said Confession and Covenant to be subscrived
in tyme comeing, be all His Majesties Subjects of this Kingdome, of
what ranke and qualitie soever.
T
he which day His Majesties Commissioner and Lords of Councell,
after the receiving of the Supplication of the Generall Assembly,
anent the subscribing of the Covenant, having returned to the
Assembly, His Majesties Commissioner, in name of the Councell,
declared: That he had received the Supplication of the Assembly,
desiring that the Covenant might receive the force of an Act of
Councell, to be subscribed by all his Majesties Subjects, that they
had found the desire so fair and reasonable, that they conceived
themselves bound in duety to grant the same, and thereupon have
made an Act of Councell to that effect, and that there rested now
the Act of Assembly; and that he himself was so fully satisfied, that
he came now, as his Majesty’s Commissioner, to consent fully unto
it; and that he was most willing that it should be enacted here in this
Assembly, to oblige all his Majesties Subjects to subscribe the said
Covenant, with the Assemblies explanation. And because there was
a third thing desired, His subscription, as the Kings Commissioner,
unto the Covenant, which he behooved to do, with a Declaration in
writ; and he declared, as a Subject, he should subscribe the
Covenant as strictly as any, with the Assemblies Declaration; but as
His Majesties Commissioner in his name he behoved to prefix to his
subscription the Declaration following, which no Scots Subjects
should subscribe or have the benefit of, no, not himself as Earle of
Traquair. The tenor whereof follows:—
Seeing this Assembly, according to the laudable forme and
custome heretofore kept in the like cases, have, in a humble and
dutiful way, supplicate to us His Majesties Commissioner, and the
Lords of His Majesties most honourable Privie Councell, That the
Covenant, with the explanation of this Assembly, might be
subscribed: And to that effect that all the subjects of this Kingdome,
by act of Councell, be required to doe the same: And that therein,
for vindicating themselves from all suspitions of disloyaltie or
derogating from the greatnesse and authoritie of our dread
Soveraigne, have therewith added a Clause, whereby this Covenant
is declared one in substance with that which was subscribed by His
Majesties Father of blessed memory, 1580, 1581, 1590, and oftner
since renewed. Therefore I, as His Majesties Commissioner, for the
full satisfaction of the Subjects, and for settling a perfect Peace in
Church and Kingdome, doe, according to my foresaids Declaration
and Subscription, subjoyned to the Act of this Assembly, of the date
the 17 of this instant, allow and consent that the Covenant be
subscribed throughout all this Kingdome. In witnes whereof I have
subscribed the premisses.
I,
John Earle of Traquair, His Majesties Commissioner in this present
Assembly, doe, in His Majesties Name, declare, that,
notwithstanding of His Majesties own inclination, and many other
grave and weightie considerations, yet such is His Majesties
incomparable goodnesse, that, for settling the present distractions,
and giving full satisfaction to the Subject, He doth allow, like as I,
His Majesties Commissioner, doe consent to the foresaid Act, and
have subscribed the premisses.
I
T is alwayes hereby declared by me, His Majesties Commissioner,
That the practise of the premisses, prohibited within this Kirk and
Kingdome, outwith the Kingdome of Scotland, shall never bind nor
inferre censure against the practises outwith the Kingdome; which,
when the Commissioner required to be insert in the Register of the
Kirk, and the Moderator, in name of the Assembly, refused to give
warrant for such practise, as not agreeable with a good conscience,
His Grace urged that it should be recorded, at least that he made
such a Declaration, whatsoever was the Assemblies Judgement in
the contrair: And so it is to be understood to be insert here onely
vocitative.
T
HE Generall Assembly, considering the great happinesse which
may flow from a full and perfect Union of this Kirk and Kingdome,
by joyning of all in one and the same Covenant with God, with the
Kings Majestie, and amongst our selves, having, by our great Oath,
declared the uprightnesse and loyaltie of our intentions in all our
proceedings, and having withall supplicated His Majesties high
Commissioner, and the Lords of His Majesties honorable Privie
Councell, to injoyn, by Act of Councell, all the Lieges in time coming
to subscribe the Confession of Faith and Covenant, which, as a
testimony of our fidelity to God and loyaltie to our King, we have
subscribed: And seeing His Majesties high Commissioner, and the
Lords of His Majesties honorable Privie Councell, have granted the
desire of our Supplication, ordaining, by civill authority, all His
Majesties Lieges, in time comming, to subscribe the foresaid
Covenant, that our Union may be the more full and perfect, We, by
our Act and Constitution Ecclesiasticall, doe approve the foresaid
Covenant in all the Heads and Clauses thereof, and ordaines of new,
under all Ecclesiasticall censure, that all the Masters of Universities,
Colledges, and Schooles, all Schollers at the passing of their
degrees, all persons suspect of Papistry, or any other errour, and,
finally, all the members of this Kirk & Kingdome, subscribe the same
with these words prefixed to their subscription: “The Article of this
Covenant, which was, at the first subscription, referred to the
determination of the Generall Assembly, being determined, and
thereby the five Articles of Perth; the government of the Kirk by
Bishops; the civill places and power of Kirkmen, upon the reasons
and grounds contained in the Acts of the Generall Assembly,
declared to be unlawfull within this Kirk: we subscribe according to
the determination foresaid.” And ordaines the Covenant, with this
Declaration, to be insert, in the Registers of the Assemblies of this
Kirk, Generall, Provinciall, and Presbyteriall, ad perpetuam rei
memoriam; and, in all humility, supplicates His Majesties high
Commissioner, and the honourable Estates of Parliament, by their
authoritie to ratifie and injoyne the same, under all civill paines,
which will tend to the glory of God, preservation of Religion, the
Kings Majesties honour, and perfect peace of this Kirk and
Kingdome.
Aug. 30. 1639.
Act anent Appellations.
T
HE Assembly appointed, that, in all time hereafter, no
Appellations should be, leaping over either Presbyterie or Synod,
but to ascend by degrees as from the Kirk Session to the Presbytry,
or from the Presbyterie to the Synod, and from the Synod to the
Generall Assembly, except it be after the Synod be past, and
immediatly before the Generall Assembly, or in the time thereof, and
renewes all former Acts made to this effect.
Act anent advising with Synods and Presbyteries
before determination in Novations.
T
HE Generall Assembly, considering that the intended Reformation
being recovered, may be established, Ordaines, that no Novation
which may disturb the peace of the Church, and make division, be
suddenly proponed and enacted: But so as the motion be first
communicate to the severall Synods, Presbyteries, and Kirks, that
the matter may be approved by all at home, and Commissioners
may come well prepared, unanimously to conclude a solide
deliberation upon these points in the Generall Assembly.
Act anent Ministers Catechising, and Familie
Exercises.
T
HE Assembly, considering that the long-waited-for fruits of the
Gospel, so mercifully planted and preserved in this Land, and the
Reformation of our selves and Families, so solemnly vowed to God of
late in our Covenant, cannot take effect, except the knowledge and
worship of God be carried from the Pulpit to every family within each
Parish, hath therefore appointed, that every Minister, besides his
paines on the Lords day, shall have weekly catechising of some part
of the Paroch, and not altogether cast over the examination of the
people till a little before the Communion. Also, that in every Familie
the worship of God be erected, where it is not, both Morning and
Evening, and that the Children and Servants be catechised at home,
by the Masters of the Families, whereof accompt shall be taken by
the Minister, and Elders assisting him in the visitation of every
Family: And, lest they fail, that visitation of the severall Kirks be
seriously followed by every Presbyterie, for this end among others.
The execution and successe whereof, being tryed by the Synods, let
it be represented to the next Generall Assembly.
Sess. XXIV. 30. Aug. à meridie.
The Assemblies Supplication to the Kings Majestie.
Most Gracious Soveraigne,
W
EE, Your Majesties most humble and loyall Subjects, the
Commissioners from all the parts of this your Majesties ancient
and native Kingdome, and members of the Nationall Assembly,
conveened at Edinburgh by your Majesties speciall indiction, and
honoured with the presence of Your Majesties High Commissioner,
have been waiting for a day of rejoycing, and of solemne
Thanksgiving to be rendred to God by this whole Kirk and Kingdome,
for giving us a King so just and religious, that it is not only lawfull for
us to be Christians under Your Majesties government, which
sometime hath been the greatest praise of great Princes, but also
that it hath pleased Your gracious Majestie to make known that it is
Your Royall will and pleasure, that all matters Ecclesiasticall be
determined in free Nationall Assemblies, and matters civill in
Parliaments; which is a most noble and ample expression of Your
Majesties justice, and we trust shall be a powerfull meane of our
common happinesse under your Majesties most blessed Raigne. In
the mean while we doe most humbly, upon the knees of our hearts,
blesse your Majestie for that happinesse already begun in the late
Assembly at Edinburgh, in the proceedings whereof, next under God,
we have laboured to approve our selves unto Your Majesties Vice-
gerent, as if Your Majesties eyes had been upon us, which was the
desire of our soules, and would have beene the matter of our full
rejoycing, and doe still continue Your Majesties most humble
supplicants for Your Majesties civill sanction and ratification of the
constitutions of the Assembly in Parliament: That your Majesties
Princely power, and the Ecclesiasticall Authority, joyning in one, the
mutual embracements of religion and justice, of truth and peace,
may be seene in this Land, which shall be to us as a resurrection
from the dead, and shall make us, being not only so farre recovered,
but also revived, to fill Heaven and Earth with our praises, and to
pray that King CHARLES may be more and more blessed, and His
throne established before the Lord for ever.
T
HE Assembly appoints the next Generall Assembly to sit at
Aberdeene the last Tuesday of July next, 1640 years. And
warneth all parties, Universities, and Burrows, to send their
Commissioners, for keeping the samine. And thereafter the Assembly
was concluded by giving of thanks by the Moderator, and singing of
a Psalme, according to the custome.
FINIS.
Index of the Principall Acts of the Assembly at
Edinburgh, 1639. Not printed.161
1.—The Kings Majesties Commission to John Earle of Traquair.
2.—Election of Master David Dickson, Moderator.
3.—The Kings Majesties Commissioners and the Assemblies
Declarations anent the Assembly of Glasgow.
4.—Renunciation of Master Alexander Lindsay, pretended Bishop
of Dunkell, of Episcopacie.
5.—Commission for Visitation of the Universitie of S. Andrews.
6.—Commission for Visitation of the Universitie of Glasgow.
7.—Act reviving former Acts against going of Salt Pannes on the
Sabbath day.
8.—Act for drawing up of a Catechisme.
9.—Articles and Overtures to be presented to the ensuing
Parliament.
10.—The Report of the Committee appointed for Examination of
the Booke called “The Kings Manifesto or Declaration.”
11.—The Covenant, or Confession of Faith.
12.—Act anent the Adjoyning of some Kirks in the Ile of Boot to
the Presbyterie of Denune.
13.—Act Adjoyning some Kirks in the Iles of Coill and Tyrie to the
Provinciall of Kilmoire.
14.—Commission for Visitation of the Colledge of Aberdeene.
15.—Commission to the Presbyterie of Edinburgh.
Miscellaneous Historical Documents,
RELATIVE TO THE ECCLESIASTICAL AND POLITICAL
EVENTS IN SCOTLAND—1639.
1639.—January 18-29.
1. Missive anent the King’s coming to York to the
Privy Council of Scotland.162
Apud Edinburgh, 29 Januarii 1639—Sederunt,
Thesaurer, Wintoun, Aduocat,
Mar, Elphinston, Treʳ Deput,
Murray, Naper, Justice Gʳᵃˡˡ,
Argyle, Clerk Regʳ, Justice Clerk.
The whilk day the Missive Letter under written, signed be the
Kings Majestie, and direct to the Lords of Privie Councill, was
presentit to the saids Lords and read in their audience, of the whilk
the tennor followes:—
Charles R.—Right trusty and right weill belovit cousine and
counsellor, &c., We griet yow weill. Whereas we intend to repare, in
person, to York, about Easter next, that we may be the more neare
to that our kingdome, for accommodating our affaires there in a
faire maner, which course we allwayes affected, as we still doe:
These are to advertyse yow of this our resolution, being confident
that, in the meane tyme, yow will not be wanting in that which
serves the good of our service; and as we shall acquaint yow frome
tyme to time with our further proceedings; so, if anie thing occurre
wherein yow would advise us, lett us lykewayes be acquainted
therewith, becaus we will speciallie rely upon your judgement: And
so we bid yow farewell, frome our Court at Whitehall, the 18 of
Januarie 1639. Sti. Sco.
Quhilk missive being heard and considert be the saids Lords, they
ordainit the same to be insert and registrat in the booke of Privie
Counsell.
1639.—January 26.
2. Letter from the King to the Nobility of England.163
Charles Rex,
Right Trusty and Right Welbeloved Cousin, We greet you well. The
late Disorders in Our Realm of Scotland, began upon pretence of
Religion, but now appearing to have been raised by Factious spirits,
and fomented by some few ill and traiterously affected particular
Persons, whose aim hath been, by troubling the Peace of that our
Kingdom, to work their own private ends, and indeed to shake off all
Monarchicall Government, though We have often assured them, that
We resolved to maintain constantly the Religion established by the
Laws of that Kingdom, is now growen to that height and dangerous
consequence, that under those sinister pretences, they have so far
seduced many of our People there, as great and considerable Forces
are raised and assembled in such sort, as we have reason to take
into consideration the Defence and Safety of this Realm of England;
and therefore upon due and mature consultation with the Lords of
our Council, We have resolved to repair in our Roial Person to the
Northern parts of this our Realm, there (by the help of Almighty
God, and the assistance of our good Subjects) to make resistance
against any invasion that may happen.
And to the end that this Expedition may be as effectual as we
design, to the Glory of God, the Honour and safety of Us, and of this
our said Kingdom of England, We have directed that a considerable
Army both of Horse and Foot, should be forthwith levied out of all
the Shires to attend Us in this Action, wherein we nothing doubt, but
the Affection, Fidelity, and Courage of our People shall well appear.
In the mean time, we have thought fit, hereby to give you notice
of this our Resolution, and of the state of our Affairs, and withall
hereby to require You to attend Our Royal Person and Standard at
Our City of York, by the first day of April next ensuing, in such
Equipage, and such Forces of Horse, as your Birth, Honour, and your
Interest in the publick Safety do oblige you unto, And as we do and
have reason to expect from you. And this our Letter shall be as
sufficient and as effectual a Warrant and Discharge unto you for the
putting of your selfe, and such as shall attend you, into Arms, and
Order as aforesaid, as if you were authorised thereunto by our Great
Seal of England. And we do require you to certifie Us under your
hand within fifteen days next after the receit hereof, what Assistance
we shall expect from you herein, and to direct the same to one of
our Principal Secretaries of State. Given under our Signet at our
Palace of Westminster the 26th day of January in the fourteenth
Year of our Raign.
Exam. P. Warwick.
1639.—February 15.
3. The King’s Letter to the Nobility.164
[This letter, though of a later date than the one which preceded it,
is precisely of the same tenor, in all respects, and seems, therefore,
to have been sent as a proof of the Kings settled purpose In regard
to the expedition. It is, therefore, omitted as superflous.]
1639.—February 20.
4. Extract from the King’s Proclamation.165
This proclamation sets forth “How traiterously some of the
Scottish Nation had practiced to pervert his Loyal Subjects of this
Realm, by scattering abroad their Libellous and Seditious Pamphlets,
mingling themselves at their publick meetings, and reproaching both
his Person and Government; That he had never any intention to alter
their Religion or Laws, but had condescended unto more for defence
thereof than they had reason to expect; That they had rejected the
Band and Covenant which themselves had prest upon the people,
because it was commended to them by his Authority; and having
made a Covenant against God and him, and made such Hostile
preparations, as if he were their sworn Enemy, and not their King;
That many of them were men of broken Fortunes, who because they
could not well be worse, hoped by engaging in this War to make
themselves better; That they had assumed unto themselves the
power of the Press, one of the chief markes of the Regal Authority,
prohibiting to Print what he commanded, and commanding to Print
what he prohibited, and dismissing the Printer whom he had
established in that Kingdom; That they had raised Arms, blockt up
and besieged his Castles, laid Impositions and Taxes upon his
people, threatned such as continued under Loyalty, with force and
violence; That they had contemned the Authority of the Council-
Table, and set up Tables of their own, from which they send their
Edicts throughout all parts of the Kingdom, contrary to the Laws
therein established, pretending in the mean time that the Laws were
violated by himself; That the question was not now, whether the
Service-Book should be received or not, or whether Episcopacy
should continue or not, but whether he were King or not? That many
of them had denied the Oaths of Supremacy and Allegiance (for
which some of them had been committed) as inconsistent and
incomptable with their holy Covenant; That being brought under a
necessity of taking Arms, he had been traduced in some of their
writings for committing the Arms he had then raised, into the hands
of professed Papists, a thing not only dishonourable to himself, and
the said noble persons, but false and odious in it self; That some of
power in the Hierarchy had been defamed for being the cause of his
taking Arms to invade that Kingdom, who on the contrary had been
only Councellors of peace, and the chief perswaders (as much as in
them lay) of the undeserved moderation wherewith he had hitherto
proceeded toward so great Offenders; That he had no intent by
commending the Service-Book unto them to innovate any thing at all
in their Religion, but only to create a conformity between the
Churches of both Kingdoms, and not to infringe any of their Liberties
which were according to the Laws; That therefore he required all his
loving Subjects not to receive any more of the said seditious
Pamphlets, but to deliver such of them as they had received, into
the hands of the next Justice of the Peace, by him to be sent to one
of his Majesties principal Secretaries; And finally, That this his
Proclamation and Declaration be read in time of Divine Service in
every Church within the Kingdom, that all his People to the meanest,
might see the notorious carriages of these men, and likewise the
Justice and Mercy of all his proceedings.”
1639.—March 1.
5. Answer to his Majesties Missive anent his
comming to Yorke.166
Apud Edinburgh, Primo Martii, 1639.—Sederunt,
Theasaurer, Lauderdaill, Clerk Regʳ,
Argile, Southesk, Aduocat,
Mar, Angus, Justice Genˡˡ,
Murray, Elphinston, Trᵉʳ Deput,
Wigton, Naper, Justice-Clerk,
Kingorne, Amant, Blackhall.
The whilk day, the Lords of Secreit Counsell ordained ane Missive
to be written to His Majestie, conteaning ane answer to his Majesties
Missive formerlie sent unto thame, and insert in the Bookes of Privy
Counsell, anent his Majesties comming to Yorke, quhilk wes
accordinglie, done of the date and tennor folowing:—
Most Sacred Soverane,
By your Majesties Letter, the 18 of Januar, your Majestie wes
graciouslie pleased, not onlie to lett us know your Majesties
resolution to come to Yorke to be so much nearer this kingdome for
accommodating your Majesties affaires heere in a faire manner,
which course your Majestie graciouslie expresseth, you still affect,
but also requires us, that if there be anie thing wherein we would
advyse your Majestie, that we sould acquaint your Majestie
therewith. Wherefore, least we sould be wanting in that dewtie
which your Majestie may justlie expect frome us as humble and
faithfull Counsellors, or seeme unworthie of the place and rowme
whiche, by your Majesties speciall favour, we injoy in the kingdome,
We cannot but acquaint your Majestie with ane Supplication given in
to us by ane great many Noblemen, Barrons, Burgesses, and others
of this Kingdome, which, for your Majesties better information, we
presume to send yow herewith. And, withall, we cannot but let your
Majestie know that, for farther cleiring thair innocencie thairof, they
have offered publicklie, at Counsell table, by thair oaths and
subscriptions, to justifie thameselves and thair intentions heerin. And
least upon this, or some suche informations, your Majestie might be
the more easilie moved to thinke upon harder courses then your
Majestie heirtofore hath beene pleased to keepe with this your
antient and native kingdome and subjects therein, we deame
ourselves bound in dewtie, and in obedience to your Royall
commandments, to represent to your Majesties wise and grave
consideration this thair Petition. And, seing the peace of your
Majesties Government, wherein consisteth our earthlie happenes,
and wealfare of the kingdome dependeth upon your Majesties
resolutions, and the course yow sall be graceouslie pleased to keepe
in the prosecution of thir maters now in hand, We humblie supplicat
your Majestie, in your accustomed fatherlie care of the good and
preservation of this your antient kingdome, and of your faithfull
subjects therein, to resolve upon sume suche course as, without
force of armes or showing of your princelie power, deplorable estate
of this kingdome may be settled, whereby your Majestie may
receave contentment, and we, your humble and faithfull subjects,
may injoy the wounted blinkes of your Majesties favour in ane
happie and peaceable Government. And so, with our humble and
heartie prayer to God to direct your Majestie in this great and
important busines after suche maner as sall be most agreable to
your Majesties honour and the peace of the kingdome, we rest, &c.
Edinburgh, Primo Martii, 1639.
Sic Subscribitur.
TRAQUAIRE,
Argile, Mar, Murray, Wigton, Kinghorne, Lauderdaill, Southesk,
Angus, Elphinston, Naper, Amont, J. Hay, Sʳ Thomas Hop, W. E.
Johnston, Ja. Carmichaell, Hamilton, Blackhall.
1639.—March 15-22.
6. Another Missive anent his Majesties comming to
Yorke.167
Apud Halyrudhous, 22 Martii 1639.—Sederunt,
Thesaurer, Justice Genᵃˡˡ, Treʳ Deput,
Mar, Aduocat, Justice Clerk.
Dumfreis,
ebookgate.com