Page 4 - Estimating_Software
P. 4

Estimating Software – Security

               Access controls are put in place by introducing security policies or guidelines.  The IT department is
               often responsible for administering these guidelines via network controls. However, every employee
               plays a role in the overall effectiveness of the strategy, with responsibilities to ensure that they are
               not ineffective or incomplete, thus compromising the overall security of the business.

               It is often possible to enable effective access controls by altering the way people perform their work
               functions.  Separation of duties (SoD) is the concept of having more than one person required to
               complete a task,  the  primary  objective being to  prevent fraud  and errors. This is achieved by
               distributing the tasks and associated privileges for a specific process among multiple people.
               We can use this principle as part of the estimating process.

               No matter what estimating technique you use (e.g. Three-Point, bottom-up or parametric estimating
               etc.), separating critical parts of the estimating process to qualified personnel for expert judgment is
               likely to achieve the best results. This separation of duties could be applied at any stage of building an
               estimate from resource cost data entry to reporting, analysis or review.

               Estimating data is a significant part of a company’s intellectual property and it flows that organisations
               must ensure they are doing all they can to protect this vital asset. Adherence to corporate internal
               policies and procedures assists in capturing companies’ IP. Additionally, software automation that
               models best practice can automatically capture IP safely and securely.  It also allows companies to
               retain an estimator's individual knowledge that may otherwise walk out the door if the estimator
               leaves, instead of capturing it as corporate IP knowledge that enhances the profitability and value of
               the company.
               Estimating projects may contain confidential information including client contact details, drawings,
               quantity take-off data, marketing information, resource rates, and margin details.

               How can companies protect this type of information beyond network and policy access controls? The
               answer is by applying a multi-faceted approach to security extending beyond simple network access.


               Application Security

               Software security assurance is a process that protects data and resources contained in and controlled
               by your software.

               Incorporating  security into software requires considerations beyond basic  authentication and
               authorisation. Architecture, testing and development processes all need to apply software security
               assurance. How users interact with the software via the user interface, and also the methods of
               operating  the software,  both dictate how software security assurance translates  to the user
               experience.

               Information about the data, often called metadata, provides a systematic method for describing the
               resources and improves the retrieval of information. Metadata is particularly useful as it provides
               valuable information about the unseen relationships between data.  It helps the user correlate data
               that was previously considered unrelated, while also providing the keys to unlocking critical or highly
               important data inside the data warehouse.

               This is a key factor as to why application security also relates to the data warehouse (in this case your
               database). How and where your data is stored and accessed is integral to the overall security of the
               application in use.  How the software application reports and uses this metadata also extends to other

                                                                                                  Page | 4
   1   2   3   4   5   6   7