{"id":1063,"date":"2022-08-10T17:57:12","date_gmt":"2022-08-10T17:57:12","guid":{"rendered":"https:\/\/blog.thepragmatic.xyz\/?page_id=1063"},"modified":"2022-12-01T22:29:44","modified_gmt":"2022-12-01T22:29:44","slug":"cyber","status":"publish","type":"page","link":"https:\/\/blog.thepragmatic.xyz\/?page_id=1063","title":{"rendered":"S-SDLC"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"559\" src=\"https:\/\/blog.thepragmatic.xyz\/wp-content\/uploads\/2022\/12\/thepragmatic_SSDLC-1024x559.jpeg\" alt=\"\" class=\"wp-image-1715\" srcset=\"https:\/\/blog.thepragmatic.xyz\/wp-content\/uploads\/2022\/12\/thepragmatic_SSDLC-1024x559.jpeg 1024w, https:\/\/blog.thepragmatic.xyz\/wp-content\/uploads\/2022\/12\/thepragmatic_SSDLC-300x164.jpeg 300w, https:\/\/blog.thepragmatic.xyz\/wp-content\/uploads\/2022\/12\/thepragmatic_SSDLC-768x419.jpeg 768w, https:\/\/blog.thepragmatic.xyz\/wp-content\/uploads\/2022\/12\/thepragmatic_SSDLC.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>IMAGEN EN CONSTRUCCION<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><em><strong>\u00abEl foco de la seguridad del software es el c\u00f3digo, a trav\u00e9s de un buen dise\u00f1o y una buena implementaci\u00f3n\u00bb<\/strong><\/em><\/p>\n\n\n\n<p class=\"has-text-align-right\"><em>J.C.C<\/em><\/p>\n\n\n\n<p><em><strong>\u00abLa mayor\u00eda de las aplicaciones son vulnerables a causa de un dise\u00f1o inseguro en su origen, llevado a cabo sin un adecuado control de seguridad durante esta fase de dise\u00f1o, del desarrollo de software.\u00bb<\/strong><\/em><\/p>\n\n\n\n<p class=\"has-text-align-right\">EC Council<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>TEXTO EN CONSTRUCCION<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Requerimientos <ul class=\"lcp_catlist\" id=\"lcp_instance_0\"><li><a href=\"https:\/\/blog.thepragmatic.xyz\/?p=1208\">Casos de mal  uso\/abuso<\/a><\/li><\/ul><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Dise\u00f1o<\/p>\n\n\n<ul class=\"lcp_catlist\" id=\"lcp_instance_0\"><li><a href=\"https:\/\/blog.thepragmatic.xyz\/?p=732\">OWASP SAMM Modelo de Madurez de Aseguramiento de Software<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Desarrollo<\/p>\n\n\n<ul class=\"lcp_catlist\" id=\"lcp_instance_0\"><li><a href=\"https:\/\/blog.thepragmatic.xyz\/?p=1193\">JSON Web Token based authentication<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Pruebas [&#8211;catlist name=SDLC-Test]<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Despliegue [&#8211;catlist name=SDLC-Deployment]<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Mantenimiento [&#8211;catlist name=SDLC-Maintenance]<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IMAGEN EN CONSTRUCCION \u00abEl foco de la seguridad del software es el c\u00f3digo, a trav\u00e9s de un buen dise\u00f1o y una [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/pages\/1063"}],"collection":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1063"}],"version-history":[{"count":18,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/pages\/1063\/revisions"}],"predecessor-version":[{"id":1717,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/pages\/1063\/revisions\/1717"}],"wp:attachment":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}