{"id":29433,"date":"2016-02-19T15:14:13","date_gmt":"2016-02-19T14:14:13","guid":{"rendered":"https:\/\/inlab.fib.upc.edu\/projecte\/s2d2-software-security-driven-development\/"},"modified":"2025-11-17T09:27:25","modified_gmt":"2025-11-17T08:27:25","slug":"s2d2-software-security-driven-development","status":"publish","type":"projecte","link":"https:\/\/inlab.fib.upc.edu\/en\/projecte\/s2d2-software-security-driven-development","title":{"rendered":"S2D2: Software Security Driven Development for the UPC"},"content":{"rendered":"","protected":false},"author":1040,"featured_media":1740,"template":"","meta":{"_acf_changed":false},"experteses":[20],"tencnologies":[207,41,148,718,333,214,594,818,49,103,838],"class_list":["post-29433","projecte","type-projecte","status-publish","has-post-thumbnail","hentry","experteses-cybersecurity-en","tencnologies-auditing-en","tencnologies-databases-en","tencnologies-developmentenvironments-en","tencnologies-eclipse-en","tencnologies-gatlab-en","tencnologies-implementationmonitoring-en","tencnologies-java-en","tencnologies-maven-en","tencnologies-programminglanguages-en","tencnologies-security-en","tencnologies-sqlite-en"],"acf":{"minidescripcio":"Metodolog\u00eda para evitar la aparici\u00f3n de vulnerabilidades durante el desarrollo de un producto y facilitar su posterior auditor\u00eda","ordre_prioritat":0,"descripcio":"El creciente n\u00famero de datos alojados en el mundo digital provoca la necesidad de disponer de una metodolog\u00eda para gestionar la seguridad que se puede aplicar en los diferentes proyectos relacionados con el desarrollo de software, donde se alojar\u00e1 o circular\u00e1 uno de los activos m\u00e1s importantes: la informaci\u00f3n.\n\nSi bien en los \u00faltimos a\u00f1os se han desarrollado buenas pr\u00e1cticas por fases concretas de desarrollo y ciertos lenguajes de programaci\u00f3n, no existe en la actualidad ninguna metodolog\u00eda que cubra completamente la seguridad sobre todas las fases del desarrollo de aplicaciones.\n\ninLab ha analizado el estado, y ha generado una <strong>metodolog\u00eda para evitar la aparici\u00f3n de vulnerabilidades durante el desarrollo de un producto y facilitar su posterior auditor\u00eda<\/strong>.\n\nSe ha creado una herramienta para facilitar la aplicaci\u00f3n de la metodolog\u00eda creada a los responsables de proyecto. Igualmente se ha probado el procedimiento creado en varios proyectos realizados por nuestro personal.","image":"","url":"","data_inici_pro":"20140910","data_fi_pro":"20151104","client":[27390],"entitat_finan":null,"colab":null,"responsable":[970,5,785],"equip":[651,986,610],"escert":"1","mpi":"0","accio":0,"padih":0,"nacional":0,"participants":"","participants2":"","projecte_final":[29509],"articles_presentacions":"<ul>\r\n \t<li><a href=\"https:\/\/inlab.fib.upc.edu\/articles\/s2d2-software-security-driven-development\">S2D2: Software Security Driven Development<\/a>, blog de l'inLab, 19 mar\u00e7 2015.<\/li>\r\n<\/ul>","slideshare":""},"_links":{"self":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/projecte\/29433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/projecte"}],"about":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/types\/projecte"}],"author":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/1040"}],"acf:post":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/pfc\/29509"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/empresa\/27390"}],"acf:user":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/610"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/986"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/651"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/785"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/5"},{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/media\/1740"}],"wp:attachment":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/media?parent=29433"}],"wp:term":[{"taxonomy":"experteses","embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/experteses?post=29433"},{"taxonomy":"tencnologies","embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/tencnologies?post=29433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}