MSF for Agile Software Development Visual Studio 2005 Team System logo

Activity:

Write Security Tests

Participating Roles

Responsible:

Tester

Overview

Entry Criteria

    Dependencies:

    • You are assigned a test task for a security requirement that is scheduled for the iteration.
    • The threat model is up-to-date and published.

    Sub-Activities

    1

    Explore the Entry Points

    • Identify a system’s entry points and functionality for the protection of assets. Use an informed testing approach, gathering information from the threat model to determine the expected avenues of attack.
    • Prioritize the entry points and cross reference the entry points with the trust levels. Create environments and test configurations for each of the trust levels.

    2

    Identify Flaws

    • Write test cases that utilize directed or semi-random tests to attempt to access to an asset. Directed measures are aimed at bypassing specific security measures. For example, look to acquire a session identifier and modify the account number in a URL.
    • Semi-random attacks may use fuzzing or the manipulation of a data format or protocol to test boundary conditions or elicit errors from the application. Test limits such as buffer sizes, integer roll-overs, negative numbers, and buffer lengths.

    3

    Exploit Weaknesses

    • Add test cases to exploit any weaknesses found to attempt to access assets. Some of these test cases will have to be exploratory rather than fixed. Take into consideration the amount of time required to figure out how to exploit weaknesses to access assets. While unauthorized entry into the system is a bug, access to protected assets presents the strongest case for fixing these bugs. Ensure that the security test case scenarios address common tactics used to capture secret data, gain unauthorized access, or deny access to legitimate users.
    • Save these manual test cases in the appropriate security requirement folder. Check them in. Add any test data requirements to the section of the test approach worksheet for this iteration.

    Exit Criteria

    The security tests cover all the elements of security requirements called for in the test task.

    Any necessary test data is added to the iteration section of the test approach worksheet.

    © 2006 Microsoft Corporation. All rights reserved.

    Version 4.1.0