{"id":12165,"date":"2023-01-26T10:28:13","date_gmt":"2023-01-26T09:28:13","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=12165"},"modified":"2025-03-03T13:19:16","modified_gmt":"2025-03-03T12:19:16","slug":"condividere-la-cultura-della-sicurezza-del-software","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/","title":{"rendered":"Condividere la \u201ccultura\u201d della Sicurezza del Software"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-sviluppo-di-software-sicuro-e-gdpr-compliant'><a href='#stoc-sviluppo-di-software-sicuro-e-gdpr-compliant'>Sviluppo di Software Sicuro e GDPR Compliant<\/a><\/li><li class='stoc-cosa-si-intende-per-sicurezza-del-software-e-cosa-tenere-in-considerazione'><a href='#stoc-cosa-si-intende-per-sicurezza-del-software-e-cosa-tenere-in-considerazione'>Cosa si intende per Sicurezza del Software (e cosa tenere in considerazione)<\/a><\/li><li class='stoc-risorse-creative-commons-per-la-sicurezza-del-software-il-nostro-contributo'><a href='#stoc-risorse-creative-commons-per-la-sicurezza-del-software-il-nostro-contributo'>Risorse Creative Commons per la sicurezza del software: il nostro contributo<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>L\u2019impegno di Intesys nel rispettare gli standard di sicurezza del software e l&#8217;approccio che adotta sono racchiusi nel documento Sviluppo di Software Sicuro e GDPR Compliant, che riassume le pratiche e le metodologie adottate dai suoi team. Un documento che garantisce il livello di servizio offerto, ma che allo stesso tempo rappresenta, secondo noi, una risorsa preziosa che abbiamo scelto di mettere in condivisione nella forma di Creative Commons, in modo che possa contribuire alla cultura della sicurezza del software, nello spirito di condivisione e di sostenibilit\u00e0 che ci contraddistingue.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-sviluppo-di-software-sicuro-e-gdpr-compliant\" class=\"wpig-heading\">Sviluppo di Software Sicuro e GDPR Compliant<\/h2>\n<p>In un periodo altamente esposto ai cyberischi, <strong>la sicurezza<\/strong> <strong>informatica <\/strong>e <strong>la protezione del dato<\/strong> sono tematiche quantomai attuali e delicate. Secondo il <a href=\"https:\/\/clusit.it\/rapporto-clusit\/\" target=\"_blank\" rel=\"noopener\">Rapporto Clusit 2022<\/a>, nell\u2019ultimo semestre dell\u2019anno trascorso gli attacchi informatici sono cresciuti del 8.4% rispetto al primo semestre 2021. Per questo abbiamo deciso di definire un processo che codifica la metodologia di sviluppo di <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-sicuro-lgsss-nostre-linee-guida\/\">software sicuro<\/a>\u00a0adottato nei progetti (Secure Software Lifecycle).<\/p>\n<p>Nel documento <strong>Sviluppo di Software Sicuro e GDPR Compliant<\/strong> abbiamo raccolto l\u2019insieme di pratiche e di metodologie che i nostri team adottano nei progetti, che applicano le regole di <a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/\" target=\"_blank\" rel=\"noopener\">sviluppo di codice sicuro<\/a> che rispettano:<\/p>\n<ul>\n<li>Lo standard ISO 27001<\/li>\n<li>Il regolamento 2016\/679 del Parlamento europeo (GDPR)<\/li>\n<li>Lo standard OWASP (Open Web <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/application-security-ovvero-come-integriamo-la-sicurezza-nel-ciclo-di-vita-del-software\/\">Application Security<\/a> Project)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]Questo approccio definisce i requisiti, le misure e i controlli di sicurezza che consideriamo e applichiamo nei processi sviluppo e manutenzione delle applicazioni software, assicurando cos\u00ec ai nostri clienti i <strong>pi\u00f9 alti standard di sicurezza<\/strong> per i prodotti che verranno rilasciati e fornendo al contempo ai developer stessi di sviluppare in sicurezza.<\/p>\n<h4 id=\"stoc-leggi-le-linee-guida-di-intesys-per-lo-sviluppo-di-software-sicuro\" class=\"wpig-heading\">Leggi le linee guida di Intesys per lo sviluppo di software sicuro:<\/h4>\n[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDJTIxLS1IdWJTcG90JTIwQ2FsbC10by1BY3Rpb24lMjBDb2RlJTIwLS0lM0UlM0NzcGFuJTIwY2xhc3MlM0QlMjJocy1jdGEtd3JhcHBlciUyMiUyMGlkJTNEJTIyaHMtY3RhLXdyYXBwZXItNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTNFJTNDc3BhbiUyMGNsYXNzJTNEJTIyaHMtY3RhLW5vZGUlMjBocy1jdGEtNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTIwaWQlM0QlMjJocy1jdGEtNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTNFJTNDJTIxLS0lNUJpZiUyMGx0ZSUyMElFJTIwOCU1RCUzRSUzQ2RpdiUyMGlkJTNEJTIyaHMtY3RhLWllLWVsZW1lbnQlMjIlM0UlM0MlMkZkaXYlM0UlM0MlMjElNUJlbmRpZiU1RC0tJTNFJTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRmN0YS1yZWRpcmVjdC5odWJzcG90LmNvbSUyRmN0YSUyRnJlZGlyZWN0JTJGNTM1MTAxNSUyRjRmOTJmMzhlLTg5YWQtNGMyNS05YjI1LTM0MDI2MThhN2ZlMSUyMiUyMHRhcmdldCUzRCUyMl9ibGFuayUyMiUyMHJlbCUzRCUyMm5vb3BlbmVyJTIyJTNFJTNDaW1nJTIwY2xhc3MlM0QlMjJocy1jdGEtaW1nJTIyJTIwaWQlM0QlMjJocy1jdGEtaW1nLTRmOTJmMzhlLTg5YWQtNGMyNS05YjI1LTM0MDI2MThhN2ZlMSUyMiUyMHN0eWxlJTNEJTIyYm9yZGVyLXdpZHRoJTNBMHB4JTNCJTIyJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZuby1jYWNoZS5odWJzcG90LmNvbSUyRmN0YSUyRmRlZmF1bHQlMkY1MzUxMDE1JTJGNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxLnBuZyUyMiUyMCUyMGFsdCUzRCUyMkxFR0dJJTIwTEUlMjBOT1NUUkUlMjBMSU5FRSUyMEdVSURBJTIyJTJGJTNFJTNDJTJGYSUzRSUzQyUyRnNwYW4lM0UlM0NzY3JpcHQlMjBjaGFyc2V0JTNEJTIydXRmLTglMjIlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmpzLmhzY3RhLm5ldCUyRmN0YSUyRmN1cnJlbnQuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlM0NzY3JpcHQlMjB0eXBlJTNEJTIydGV4dCUyRmphdmFzY3JpcHQlMjIlM0UlMjBoYnNwdC5jdGEubG9hZCUyODUzNTEwMTUlMkMlMjAlMjc0ZjkyZjM4ZS04OWFkLTRjMjUtOWIyNS0zNDAyNjE4YTdmZTElMjclMkMlMjAlN0IlMjJ1c2VOZXdMb2FkZXIlMjIlM0ElMjJ0cnVlJTIyJTJDJTIycmVnaW9uJTIyJTNBJTIybmExJTIyJTdEJTI5JTNCJTIwJTNDJTJGc2NyaXB0JTNFJTNDJTJGc3BhbiUzRSUzQyUyMS0tJTIwZW5kJTIwSHViU3BvdCUyMENhbGwtdG8tQWN0aW9uJTIwQ29kZSUyMC0tJTNF[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-cosa-si-intende-per-sicurezza-del-software-e-cosa-tenere-in-considerazione\" class=\"wpig-heading\">Cosa si intende per Sicurezza del Software (e cosa tenere in considerazione)<\/h2>\n<p>Un software \u201c\u00e8 sicuro\u201d in relazione<strong> alle minacce <\/strong>che sono identificate per le funzioni previste, al livello di<strong> rischio<\/strong> calcolato per le singole minacce e alle misure di <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\"><strong>software security<\/strong><\/a>\u00a0poste in essere per mitigare i livelli di rischio associati alle minacce.<\/p>\n<p>Durante le fasi di analisi della sicurezza applicativa di una architettura di sistema (da definire o in fase di rivisitazione) \u00e8 necessaria l\u2019attuazione di <strong>pratiche di progettazione sicura<\/strong> attraverso l\u2019individuazione di requisiti di sicurezza del software e contromisure, attraverso un approccio di <strong>Defense in Depth<\/strong> dell\u2019applicazione.<\/p>\n<h3 id=\"stoc-security-privacy-by-design\" class=\"wpig-heading\">Security &amp; Privacy by Design<\/h3>\n<p>Il nostro approccio <a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/\" target=\"_blank\" rel=\"noopener\">Design to Deliver<\/a> punta a coniugare tutte le esigenze tecnologiche e di business, dall\u2019analisi arriva all\u2019implementazione coprendo \u201cfull stack\u201d l\u2019intera filiera di sviluppo software.<\/p>\n<p>Nel nostro approccio sono considerati fin dalla progettazione (appunto \u201cby design\u201d) sia gli aspetti di <strong>Security<\/strong>, cio\u00e8 i presupposti di Riservatezza, Integrit\u00e0 e Disponibilit\u00e0 del dato, sia i pi\u00f9 mirati aspetti di <strong>Privacy<\/strong>, che pongono l\u2019accento alla protezione dei dati personali come previsto dal GDPR (quali diritto all\u2019oblio, trasportabilit\u00e0, etc.).<\/p>\n<h3 id=\"stoc-minacce-alla-sicurezza-del-software\" class=\"wpig-heading\">Minacce alla sicurezza del software<\/h3>\n<p>L\u2019individuazione e la modellazione delle minacce relative alla sicurezza informatica vengono effettuate seguendo il <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stride\" target=\"_blank\" rel=\"noopener\"><strong>modello STRIDE<\/strong><\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h3 id=\"stoc-analisi-e-calcolo-del-livello-di-rischio\" class=\"wpig-heading\">Analisi e calcolo del livello di rischio<\/h3>\n<p>Il livello di rischio viene calcolato sulla base della composizione di <strong>Probabilit\u00e0<\/strong> del concretizzarsi del rischio e <strong>Impatto<\/strong> \u2013 su sicurezza e su GDPR \u2013 a cui vengono assegnati un valore che si combinano secondo la seguente tabella.<\/p>\n<h3 id=\"stoc-piano-dei-test\" class=\"wpig-heading\">Piano dei test<\/h3>\n<p>Abbiamo definito un processo di <strong>Software Quality Assurance (SQA)<\/strong> con l\u2019obiettivo di assicurare che il processo di sviluppo software sia monitorato e sia compliant con lo<a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/certificazione-iso-27001-garantire-la-sicurezza-delle-informazioni-dei-nostri-clienti\/\"> standard ISO27001<\/a> e il GDPR: prima del rilascio, il software viene testato e analizzato, a partire dal codice statico fino ai test funzionali.<\/p>\n<h3 id=\"stoc-continuous-security\" class=\"wpig-heading\">Continuous security<\/h3>\n<p>Una volta ultimato e rilasciato, la tematica della <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\">sicurezza del software<\/a> non \u00e8 conclusa. Una metodologia per lo <a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/\">sviluppo di codice sicuro<\/a> deve includere monitoraggio, controlli e azioni durante la <strong>vita in produzione del software<\/strong>. In ottica di un processo di Continuous Security e in accordo con il documento dell\u2019AGID \u201c<a href=\"https:\/\/www.agid.gov.it\/it\/sicurezza\/cert-pa\/linee-guida-sviluppo-del-software-sicuro\" target=\"_blank\" rel=\"noopener\">Linee guida per l\u2019adozione di un ciclo di sviluppo di software sicuro<\/a>\u201d il nostro processo prevede analisi e valutazioni dei rischi e delle vulnerabilit\u00e0.<\/p>\n<h4 id=\"stoc-consulta-il-documento-di-assessment-per-lo-sviluppo-di-software-sicuro\" class=\"wpig-heading\">Consulta il documento di Assessment per lo sviluppo di software sicuro:<\/h4>\n[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-risorse-creative-commons-per-la-sicurezza-del-software-il-nostro-contributo\" class=\"wpig-heading\">Risorse Creative Commons per la sicurezza del software: il nostro contributo<\/h2>\n<p>Intesys \u00e8 un\u2019azienda fortemente orientata alla sostenibilit\u00e0 e alla condivisione delle informazioni e da sempre sposa il concetto di <strong>sviluppo sostenibile come motore di business<\/strong>, sostenuto dalle Nazioni Unite.<\/p>\n<p>L\u2019organizzazione che presiede alle licenze Creative Commons prende ispirazione da questo approccio \u201c<a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/sostenibilita-software-open-source\/\">open source<\/a>\u201d, contribuendo a salvaguardare i diritti universali e fondamentali di accesso alla conoscenza, alla scienza, alla tecnologia, alla cultura e all\u2019istruzione. Per questo motivo abbiamo scelto di<strong> divulgare con licenza Creative Commons<\/strong> \u2013 fin dal primo momento in cui \u00e8 stato formalizzato \u2013 il nostro documento metodologico sullo sviluppo di codice sicuro: un atto significativo per liberare la conoscenza, condividendo best practice e risorse con chi potr\u00e0 farne buon uso.<\/p>\n<h3 id=\"stoc-licenze-creative-commons\" class=\"wpig-heading\">Licenze Creative Commons<\/h3>\n<p><a href=\"https:\/\/creativecommons.it\/chapterIT\/\" target=\"_blank\" rel=\"noopener\">Creative Commons<\/a> \u00e8 un\u2019organizzazione internazionale senza scopo di lucro che stabilisce le regole di utilizzo &#8220;copyleft&#8221; di licenze permissive, strumenti che i titolari dei diritti d\u2019autore e dei diritti connessi possono utilizzare per consentire ad altri di condividere, riutilizzare e remixare legalmente le proprie opere; il rilascio di materiale con una delle sei licenze CC chiarisce agli utenti cosa possono o non possono fare.<\/p>\n<p>Le sei diverse licenze sono il frutto della combinazione di quattro clausole:[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;5px&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_column_text]\n<p style=\"text-align: center\"><em>Clicca sull&#8217;immagine per ingrandire.<\/em><\/p>\n[\/vc_column_text][image_with_animation image_url=&#8221;12174&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; img_link_large=&#8221;yes&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; top_margin=&#8221;30&#8243; bottom_margin=&#8221;30&#8243; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<em>Ilario Gavioli, General Manager di Intesys, parla di Sicurezza del Software a ESICONF2025. <\/em><em>Guarda il video completo e scopri come creiamo applicazioni sicure sin dalla fase di progettazione, garantendo al contempo qualit\u00e0 e sostenibilit\u00e0 dei costi.<\/em>[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=qsKyoH8dfic&#8221; align=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<blockquote><p>Il nostro contributo allo sviluppo di una cultura del software sicuro e alla condivisione delle best practice \u00e8 il documento <strong>Sviluppo di Software Sicuro e GDPR Compliant<\/strong>, che potete scaricare ed \u00e8 liberamente condivisibile con Obbligo di Attribuzione, senza modifiche e senza fini commerciali.<\/p><\/blockquote>\n<h4 id=\"stoc-\" class=\"wpig-heading\"><\/h4>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#0f33ce&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; color_overlay=&#8221;#0f33ce&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.8&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10304&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;35%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h5 id=\"stoc-software-sicuro\" class=\"wpig-heading\">SOFTWARE SICURO<\/h5>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_custom_heading text=&#8221;Scopri come sviluppiamo<br \/>\nsoluzioni a prova di cyberischio&#8221; font_container=&#8221;tag:h3|font_size:34px|text_align:left|color:%23ffffff|line_height:42px&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][nectar_btn size=&#8221;medium&#8221; button_style=&#8221;see-through-2&#8243; color_override=&#8221;#ffffff&#8221; hover_color_override=&#8221;#17fdb4&#8243; hover_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCOPRI DI PI\u00d9&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":6,"featured_media":12178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[322,385,784],"class_list":{"0":"post-12165","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-gdpr","9":"tag-iso-27001","10":"tag-secure-coding"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sicurezza del software: scopri come ne condividiamo la cultura<\/title>\n<meta name=\"description\" content=\"L&#039;importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicurezza del software: scopri come ne condividiamo la cultura\" \/>\n<meta property=\"og:description\" content=\"L&#039;importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T09:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T12:19:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/social_software-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ilario Gavioli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ilario Gavioli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\",\"name\":\"Sicurezza del software: scopri come ne condividiamo la cultura\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png\",\"datePublished\":\"2023-01-26T09:28:13+00:00\",\"dateModified\":\"2025-03-03T12:19:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/7cdebffdaa1238d1c457c601ca7bd381\"},\"description\":\"L'importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png\",\"width\":1280,\"height\":960,\"caption\":\"sicurezza del software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Condividere la \u201ccultura\u201d della Sicurezza del Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/7cdebffdaa1238d1c457c601ca7bd381\",\"name\":\"Ilario Gavioli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f519228ca80b0d0d760754171645514142c1f3118f9336303ad5ac1069c0f0a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f519228ca80b0d0d760754171645514142c1f3118f9336303ad5ac1069c0f0a1?s=96&d=mm&r=g\",\"caption\":\"Ilario Gavioli\"},\"description\":\"Dal 1995, Ilario predispone la strategia e identifica le tecnologie su cui focalizzare le attivit\u00e0 in funzione dei piani di business delle aziende.\",\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/ilario-gavioli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicurezza del software: scopri come ne condividiamo la cultura","description":"L'importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/","og_locale":"it_IT","og_type":"article","og_title":"Sicurezza del software: scopri come ne condividiamo la cultura","og_description":"L'importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/","og_site_name":"Intesys Journal","article_published_time":"2023-01-26T09:28:13+00:00","article_modified_time":"2025-03-03T12:19:16+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/social_software-security.png","type":"image\/png"}],"author":"Ilario Gavioli","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Ilario Gavioli","Tempo di lettura stimato":"10 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/","name":"Sicurezza del software: scopri come ne condividiamo la cultura","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png","datePublished":"2023-01-26T09:28:13+00:00","dateModified":"2025-03-03T12:19:16+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/7cdebffdaa1238d1c457c601ca7bd381"},"description":"L'importanza dello sviluppo di software sicuro e GDPR compliant: il nostro approccio per offrire alti standard di sicurezza del software","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2023\/01\/header_software-security.png","width":1280,"height":960,"caption":"sicurezza del software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"Condividere la \u201ccultura\u201d della Sicurezza del Software"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/7cdebffdaa1238d1c457c601ca7bd381","name":"Ilario Gavioli","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f519228ca80b0d0d760754171645514142c1f3118f9336303ad5ac1069c0f0a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f519228ca80b0d0d760754171645514142c1f3118f9336303ad5ac1069c0f0a1?s=96&d=mm&r=g","caption":"Ilario Gavioli"},"description":"Dal 1995, Ilario predispone la strategia e identifica le tecnologie su cui focalizzare le attivit\u00e0 in funzione dei piani di business delle aziende.","url":"https:\/\/www.intesys.it\/journal\/autore\/ilario-gavioli\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/12165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=12165"}],"version-history":[{"count":12,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/12165\/revisions"}],"predecessor-version":[{"id":15095,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/12165\/revisions\/15095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/12178"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=12165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=12165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=12165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}