CERT-SEI

Cybersecurity Engineering

ACSAC 2014 Course on Security Risk Management

At the 2014 Annual Computer Security Applications Conference (ACSAC), attend our course, Security Risk Management Using the Security Engineering Risk Analysis (SERA) Method.
Register for the course

New Podcast: Security and Wireless Emergency Alerts

Listen to Carol Woody and Christopher Alberts discuss guidelines that they developed to ensure that the wireless emergency alerts service remains robust and resilient against cyber attacks. Also be sure to listen to the related podcast recorded earlier this year.
Listen to the podcast

Security Engineering Risk Analysis (SERA)

This new research area focuses on early detection and remediation of design weaknesses to help reduce residual security risks when a system is deployed.
Learn more about SERA.

Software Assurance for Executives

Software Assurance for Executives video modules and slide sets provide information and guidance on all stages of the software assurance lifecycle, as well as emerging topics such as cloud computing and standards that support software assurance.
Download our course materials.

Software Assurance Curriculum

Our software assurance curriculum and competency model help to prepare the next generation of software security experts.
Get smart about software assurance

Security Quality Requirements Engineering (SQUARE)

The nine-step SQUARE process helps you to build security into the early stages of the lifecycle. We also have tools that adapt the SQUARE process to consider privacy requirements (P-SQUARE) and acquisition (A-SQUARE).
Read about the SQUARE method and tools

Our Mission: We address security, software assurance, and survivability throughout the development and acquisition lifecycles by creating methods, solutions, and training that can be integrated into your existing practices.

Organizations that have focused on security in the early stages have seen major reductions in operational vulnerabilities, resulting in reductions in software patching. Our research from one case study showed that the cost to fix requirement problems identified later in the project cost close to $2.5 million; the cost to fix these problems early in the lifecycle was $0.5 million. In addition, Microsoft's own data show that when security was considered throughout the Windows Vista development lifecycle, vulnerabilities were reduced by 45%.

The CERT Cybersecurity Engineering team addresses security and survivability throughout the development and acquisition lifecycles, especially in the early stages. Our products and curricula can be integrated into your existing practices.

Development and Acquisition Lifecycles

We develop methods for building security in.

Our Security Quality Requirements Engineering (SQUARE) process, Survivability Analysis Framework, and Building Assured Systems Framework, each help you to build assured systems. We also have tools that adapt the SQUARE process to consider privacy (P-SQUARE) and acquisition (A-SQUARE).

We develop methods for analyzing your development lifecycle.

Our Complexity Modeling and Analysis research helps you analyze complexity and integration issues throughout the development lifecycle to ensure that development is proceeding as planned. We can also help you link security decisions to mission-critical needs.

We develop ways to reduce risk in your supply chain.

Our Supply Chain Assurance research shows you how to reduce risk from software defects, while leveraging the significant opportunities supply chains afford.

We develop tools for measuring and analyzing software security.

Our Software Security Measurement and Analysis research, including our Integrated Measurement and Analysis Framework (IMAF) and Mission Risk Diagnostic (MRD) approaches, helps you establish and measure the confidence that a software-reliant product is sufficiently secure to meet operational needs.

We create software assurance curricula for use in training programs or academic courses.

Our Curricula and Course Materials provide a basis on which organizations and educational institutions can build their own programs. The Software Assurance Competency Model creates a foundation for assessing and advancing the capability of software assurance professionals.

Engage with Us

We can help you with your security and software assurance needs in a number of ways.

Engage with Us

News & Announcements

Publications & Media

RE'14 Tutorial on Gathering Unstated Requirements
SEI researchers will present a tutorial at the 22nd IEEE International Requirements Engineering Conference (RE'14) to describe KJ+, a method for determining the unstated needs of varied stakeholders. Register by July 14 to take advantage of the early-bird discounted rate.

Curriculum Recognized by the IEEE Computer Society and the Association for Computing Machinery
The IEEE Computer Society and the Association for Computing Machinery recognized the Master of Software Assurance Reference Curriculum in an IEEE press release.

Security Quality Requirements Engineering (SQUARE)
In this report, the authors present their results of using SQUARE when working with three clients over the course of a semester.

Software Assurance Curriculum
Our software assurance curriculum and competency model help to prepare the next generation of software security experts.

Survivability Analysis Framework
In this report, the authors describe the Survivability Analysis Framework, which is used to evaluate critical operational capabilities.

Supply Chain Assurance
Our work in supply chain assurance can help you reduce the risk from software defects while leveraging the significant opportunities afforded by supply chains.

Software Security Assurance Measurement and Analysis
Our research into measuring and analyzing software security assurance helps you to establish and measure justified confidence that software-reliant products are sufficiently secure to meet your operational needs.