BSIMM3 will let organizers see how initiatives have evolved. One of its new features is the result of the group going back and re-measuring 12 of the original initiatives, to see what changes and improvements have made over time. When it comes to software, security may still not be as sexy as features and functions, but it is now officially essential.For proof, look at the explosive growth of BSIMM — the Building Security In Maturity Model — a burgeoning compilation of real-world data and analysis designed to help software developers build security into their products from the start, instead of trying to bolt it on later.It was less than two years ago, in September 2009, when three leaders from the security firms Cigital and Fortify went public with BSIMM, a set of best practices culled from studying nine software security initiatives.Also see: Code security: A survival guide Less than a year later, in April 2010, BSIMM2 had tripled its reach, with data from studying 30 initiatives, including some of the biggest in finance, software and information technology. They include Bank of America, Microsoft, Google, Adobe, Symantec, Intel and Intuit.And in August, they will roll out BSIMM3, which will include data from 60 initiatives, according to Gary McGraw, CTO of Cigital, who launched BSIMM with Cigital colleague Sammy Migues and Brian Chess of Fortify. BSIMM is not a set of instructions. “It is a descriptive model, not prescriptive,” McGraw says. “It doesn’t tell you what you should do. It tells you what other people are already doing.”BSIMM breaks down what those other firms are doing into a list of 109 specific activities, about 30 of which are common to more than two thirds of the participants.“We’re not saying you (another developer) should do them all,” McGraw says, “but it lets you see what has already worked.”Also see: Software security basics for application development managersBSIMM3 will also let them see how initiatives have evolved. One of its new features, McGraw says, is the result of his group going back and re-measuring 12 of the original initiatives, to see what changes and improvements have made over time.Best of all, it is free. BSIMM has been released under a creative commons license, which lets developers take what they think is useful and create their own model. They are just asked to give credit for the material used to BSIMM. McGraw admits it is gratifying to see software security getting the respect it deserves. A year ago, he kidded about how when he started, 15 years earlier, when he couldn’t even sell the concept to his mother, but is now in demand from the world’s biggest software firms.“In the beginning, it was all advocacy and evangelism,” he says, noting that security was more of an afterthought, since all the focus was on features and functions. Security, he says, was thought of as “sprinkling fairy dust” on a product.Also see: Code Security: MidAmerican Energy’s top priority after SQL injection attacks“But security is not a thing, it is a property (of software),” he says. He is also excited that it has created a community among firms, some of which are fierce competitors, but have common interests when it comes to security from attacks that could compromise proprietary information and the personal information of customers.“They’re talking directly to each other and learning from each other,” he says. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe