Skip to main content

Using the Security Development Lifecycle Best Practices at Microsoft

Rate:  

About This Video

Most security vulnerabilities exist at the application layer, not the network layer. Microsoft IT's ACE team has developed best practices for securing applications and shares the process, lifecycle, and approach they take in reviewing applications for security compliance.

 

Published Date: May 05, 2011
Presented By: Microsoft IT Showcase

 

 

Downloads

Video: WMV | MP4 | WMV (ZIP)