{"id":14422,"date":"2024-10-03T10:27:55","date_gmt":"2024-10-03T08:27:55","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=14422"},"modified":"2025-03-17T10:26:30","modified_gmt":"2025-03-17T09:26:30","slug":"software-security-come-realizzare-applicazioni-sicure","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/","title":{"rendered":"Software security: come realizziamo applicazioni sicure e resilienti, in 6 step"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-cosa-rende-sicuro-un-sistema-software'><a href='#stoc-cosa-rende-sicuro-un-sistema-software'>Cosa rende sicuro un sistema software<\/a><\/li><li class='stoc-un-percorso-a-6-step-per-la-software-security'><a href='#stoc-un-percorso-a-6-step-per-la-software-security'>Un percorso a 6 step per la software security<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>In Intesys, adottiamo un approccio security-first nei nostri progetti di sviluppo, ovvero integriamo la software security in tutto il percorso che va dalla definizione e dall\u2019analisi dei requisiti alla progettazione dell\u2019architettura, fino alla scrittura del codice, al testing, al rilascio e al monitoraggio costante. In questo modo, aiutiamo le aziende ad essere pi\u00f9 competitive e resilienti nell\u2019era del cyber risk.<\/strong><br \/>\n<strong>In questo articolo approfondiamo la nostra visione e, soprattutto, esploriamo il percorso che affrontiamo insieme ai nostri clienti per realizzare sistemi software sicuri, capaci di reggere l\u2019urto di molteplici minacce, interne e\/o esterne all\u2019organizzazione.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-cosa-rende-sicuro-un-sistema-software\" class=\"wpig-heading\">Cosa rende sicuro un sistema software<\/h2>\n<p>Le Linee Guida per lo Sviluppo di Software Sicuro (LGSSS) sono uno dei tool che ci permettono di costruire applicativi solidi e resilienti. Tuttavia, non bisogna pensare che il concetto di <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-sicuro-lgsss-nostre-linee-guida\/\" rel=\"noopener\">software sicuro<\/a> <strong>riguardi unicamente la scrittura del codice<\/strong>, sia pur assistito da best practice di sicurezza.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]Nella nostra visione, infatti, un applicativo si pu\u00f2 definire sicuro se \u00e8 l\u2019output finale di un <strong>insieme di processi, metodologie, tool, tecnologie e anche competenze<\/strong> che, all\u2019interno di un unico progetto, operano in modo sinergico e orientato a 360 gradi verso la software security. In altri termini, la scrittura del codice non vive di vita propria, ed \u00e8 <strong>una delle fasi finali<\/strong> di un processo che va <strong>indirizzato verso la sicurezza ad ogni livello e in ogni fase<\/strong>.<\/p>\n<p>Un altro aspetto fondamentale, che premettiamo alla descrizione del processo, \u00e8 la necessit\u00e0 di un <strong>impegno concreto (anche) da parte del cliente<\/strong>, ovvero di chi poi utilizzer\u00e0 il codice. La sicurezza applicativa non pu\u00f2 essere demandata unicamente a chi produce l\u2019applicazione, nella fattispecie a Intesys, ma richiede un <strong><em>commitment<\/em> importante anche da parte del destinatario del codice<\/strong>. Questo non riguarda soltanto fasi specifiche come la definizione dei <em>security requirements<\/em>, che ovviamente \u00e8 a carico dell\u2019azienda, ma anche la gestione di attivit\u00e0 sistemistiche che influenzano la sicurezza dell\u2019applicativo e che sono di competenza del cliente, come per esempio l\u2019aggiornamento dei server, la configurazione corretta dei firewall e molto altro.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>Leggi il nostro documento metodologico di Sviluppo Software Sicuro:<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; top_margin=&#8221;30&#8243; bottom_margin=&#8221;30&#8243; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<em>Ilario Gavioli, General Manager di Intesys, parla di Sicurezza del Software a ESICONF2025. <\/em><em>Guarda il video completo e scopri come creiamo applicazioni sicure sin dalla fase di progettazione, garantendo al contempo qualit\u00e0 e sostenibilit\u00e0 dei costi.<\/em>[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=qsKyoH8dfic&#8221; align=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-un-percorso-a-6-step-per-la-software-security\" class=\"wpig-heading\">Un percorso a 6 step per la software security<\/h2>\n<p>Il percorso verso un applicativo sicuro inizia, come detto, ben prima della scrittura del codice. Si tratta infatti di un percorso che affrontiamo con i nostri clienti e che tocca tematiche culturali, organizzative, tecniche e anche commerciali, in un impegno reciproco volto a garantire la <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\">sicurezza del software<\/a> su cui si fonda il business.[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;Extra-Color-3&#8243; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;no-border&#8221;][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347847-3&#8243; tab_id=&#8221;1741003347847-2&#8243; header=&#8221;1. Condivisione della cultura della sicurezza&#8221;]Nella fase iniziale, sensibilizziamo i nostri interlocutori sull&#8217;importanza della software security e sulla necessit\u00e0 di un impegno condiviso verso la sicurezza del software. Spieghiamo le rispettive responsabilit\u00e0, spesso evidenziando la necessit\u00e0 di <strong>introdurre delle figure specializzate<\/strong>, come i CISO o team dedicati, con compiti e responsabilit\u00e0 specifiche in ambito sicurezza.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347864-2&#8243; tab_id=&#8221;1741003347865-4&#8243; header=&#8221;2. Definizione dei security requirements&#8221;]L&#8217;azienda, con il supporto di Intesys, definisce a questo punto i <strong>requisiti di sicurezza<\/strong>, tenendo conto del contesto operativo, delle normative cui \u00e8 soggetta e della tipologia di applicazione che intende adottare. Questa fase presuppone una valutazione delle minacce esistenti e la definizione, insieme a Intesys, di <strong>quale sia la soglia di rischio accettabile<\/strong>. Omettendo questa fase, diventa pressoch\u00e9 impossibile comprendere quali misure di sicurezza vadano applicate nella fase successiva.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347873-4&#8243; tab_id=&#8221;1741003347874-1&#8243; header=&#8221;3. Risk Assessment con metodologia STRIDE&#8221;]Definiti i requisiti, eseguiamo in Intesys un risk assessment utilizzando la <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/come-viene-sviluppato-un-software-sicuro\/\">metodologia STRIDE<\/a> per <strong>identificare e classificare le potenziali minacce alla sicurezza della (futura) applicazione<\/strong>. Utilizzando una <em>matrice impatto-probabilit\u00e0<\/em>, siamo in grado di <strong>quantificare il rischio<\/strong> relativo a ciascuna minaccia.[\/nectar_icon_list_item][\/nectar_icon_list][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; left_padding_desktop=&#8221;60&#8243; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>Consulta il documento di Assessment per Sviluppo Software Sicuro:<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDJTIxLS1IdWJTcG90JTIwQ2FsbC10by1BY3Rpb24lMjBDb2RlJTIwLS0lM0UlM0NzcGFuJTIwY2xhc3MlM0QlMjJocy1jdGEtd3JhcHBlciUyMiUyMGlkJTNEJTIyaHMtY3RhLXdyYXBwZXItOGFiNmQyZjMtMDc0MS00YTU5LTk5NzktMjFkNzk2Mjk2ZTk2JTIyJTNFJTNDc3BhbiUyMGNsYXNzJTNEJTIyaHMtY3RhLW5vZGUlMjBocy1jdGEtOGFiNmQyZjMtMDc0MS00YTU5LTk5NzktMjFkNzk2Mjk2ZTk2JTIyJTIwaWQlM0QlMjJocy1jdGEtOGFiNmQyZjMtMDc0MS00YTU5LTk5NzktMjFkNzk2Mjk2ZTk2JTIyJTNFJTNDJTIxLS0lNUJpZiUyMGx0ZSUyMElFJTIwOCU1RCUzRSUzQ2RpdiUyMGlkJTNEJTIyaHMtY3RhLWllLWVsZW1lbnQlMjIlM0UlM0MlMkZkaXYlM0UlM0MlMjElNUJlbmRpZiU1RC0tJTNFJTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRmN0YS1yZWRpcmVjdC5odWJzcG90LmNvbSUyRmN0YSUyRnJlZGlyZWN0JTJGNTM1MTAxNSUyRjhhYjZkMmYzLTA3NDEtNGE1OS05OTc5LTIxZDc5NjI5NmU5NiUyMiUyMHRhcmdldCUzRCUyMl9ibGFuayUyMiUyMHJlbCUzRCUyMm5vb3BlbmVyJTIyJTNFJTNDaW1nJTIwY2xhc3MlM0QlMjJocy1jdGEtaW1nJTIyJTIwaWQlM0QlMjJocy1jdGEtaW1nLThhYjZkMmYzLTA3NDEtNGE1OS05OTc5LTIxZDc5NjI5NmU5NiUyMiUyMHN0eWxlJTNEJTIyYm9yZGVyLXdpZHRoJTNBMHB4JTNCJTIyJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZuby1jYWNoZS5odWJzcG90LmNvbSUyRmN0YSUyRmRlZmF1bHQlMkY1MzUxMDE1JTJGOGFiNmQyZjMtMDc0MS00YTU5LTk5NzktMjFkNzk2Mjk2ZTk2LnBuZyUyMiUyMCUyMGFsdCUzRCUyMlNDQVJJQ0ElMjBJTCUyMERPQ1VNRU5UTyUyMiUyRiUzRSUzQyUyRmElM0UlM0MlMkZzcGFuJTNFJTNDc2NyaXB0JTIwY2hhcnNldCUzRCUyMnV0Zi04JTIyJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZqcy5oc2N0YS5uZXQlMkZjdGElMkZjdXJyZW50LmpzJTIyJTNFJTNDJTJGc2NyaXB0JTNFJTNDc2NyaXB0JTIwdHlwZSUzRCUyMnRleHQlMkZqYXZhc2NyaXB0JTIyJTNFJTIwaGJzcHQuY3RhLmxvYWQlMjg1MzUxMDE1JTJDJTIwJTI3OGFiNmQyZjMtMDc0MS00YTU5LTk5NzktMjFkNzk2Mjk2ZTk2JTI3JTJDJTIwJTdCJTIydXNlTmV3TG9hZGVyJTIyJTNBJTIydHJ1ZSUyMiUyQyUyMnJlZ2lvbiUyMiUzQSUyMm5hMSUyMiU3RCUyOSUzQiUyMCUzQyUyRnNjcmlwdCUzRSUzQyUyRnNwYW4lM0UlM0MlMjEtLSUyMGVuZCUyMEh1YlNwb3QlMjBDYWxsLXRvLUFjdGlvbiUyMENvZGUlMjAtLSUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;40&#8243;][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;Extra-Color-3&#8243; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;no-border&#8221;][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347909-10&#8243; tab_id=&#8221;1741003347909-3&#8243; header=&#8221;4. Analisi tecnica per la software security&#8221;]Al risk assessment segue poi una fase di analisi tecnica il cui obiettivo \u00e8 <strong>progettare una soluzione che rispetti i requisiti di sicurezza e tenga fede ai principi di <em><strong>security by design<\/strong><\/em> e <em><strong>security by default<\/strong><\/em><\/strong> secondo le Linee Guida per lo <a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/\" target=\"_blank\" rel=\"noopener\">Sviluppo di Codice Sicuro<\/a> (LGSSS). Ogni decisione tecnica viene valutata attentamente per assicurare che la sicurezza sia parte integrante della soluzione finale e che tutte le misure necessarie vengano effettivamente incluse nel progetto.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347918-7&#8243; tab_id=&#8221;1741003347918-1&#8243; header=&#8221;5. Secure Software Lifecycle&#8221;]A questo punto si entra nella fase di sviluppo <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-sicuro-lgsss-nostre-linee-guida\/\">software sicuro<\/a>. In Intesys, il nostro obiettivo \u00e8 integrare <strong>la sicurezza<\/strong> in tutto il <a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/ciclo-di-vita-del-software\/\" target=\"_blank\" rel=\"noopener\">ciclo di vita del software<\/a>, e per raggiungerlo possiamo contare su un ecosistema sinergico di <strong>competenze, processi e strumenti<\/strong>.<\/p>\n<p>Oltre a disporre di <strong>tutte le professionalit\u00e0 necessarie<\/strong>, con ruoli e responsabilit\u00e0 ben definite, abbiamo sviluppato dei processi ad hoc per <strong>standardizzare il pi\u00f9 possibile i progetti software<\/strong> (gestione del progetto, sviluppo della documentazione, gestione del ciclo di vita\u2026) e ci basiamo su <strong>metodologie e <em><strong>best practice<\/strong><\/em> riconosciute<\/strong>, tra cui l\u2019impiego di librerie sicure e di pattern di progettazione consolidati. In questa fase applichiamo al codice le nostre Linee Guida per lo Sviluppo del Software Sicuro, adottiamo misure sistemistiche volte a rafforzare la sicurezza dell\u2019infrastruttura e <strong>integriamo nelle pipeline di sviluppo dei tool di sicurezza<\/strong> come quelli di analisi statica del codice e quelli utili a identificare vulnerabilit\u00e0 nelle librerie di terze parti.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003347926-3&#8243; tab_id=&#8221;1741003347926-6&#8243; header=&#8221;6. Controllo continuo della sicurezza&#8221;]Infine, non bisogna dimenticare che la sicurezza \u00e8 un processo in evoluzione, che <strong>non si conclude con il rilascio dell\u2019applicativo<\/strong>. In Intesys ci impegniamo a fornire ai nostri clienti report costanti e dettagliati, ma soprattutto ad <strong>effettuare verifiche regolari delle vulnerabilit\u00e0 e a predisporre soluzioni tempestive<\/strong>, applicando patch e implementando ogni misura necessaria per garantire la protezione continua del software, e di conseguenza del business dei nostri clienti.[\/nectar_icon_list_item][\/nectar_icon_list][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#0f33ce&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.8&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10304&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;35%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h5 id=\"stoc-software-sicuro\" class=\"wpig-heading\">SOFTWARE SICURO<\/h5>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_custom_heading text=&#8221;Scopri come sviluppiamo<br \/>\nsoluzioni a prova di cyberischio&#8221; font_container=&#8221;tag:h3|font_size:34px|text_align:left|color:%23ffffff|line_height:42px&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;see-through-2&#8243; color_override=&#8221;#ffffff&#8221; hover_color_override=&#8221;#17fdb4&#8243; hover_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCOPRI DI PI\u00d9&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":121,"featured_media":14454,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[206,784,233,780],"class_list":{"0":"post-14422","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-cybersecurity","9":"tag-secure-coding","10":"tag-development","11":"tag-software-sicuro"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software security: come realizziamo applicazioni sicure in 6 step<\/title>\n<meta name=\"description\" content=\"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software security: come realizziamo applicazioni sicure in 6 step\" \/>\n<meta property=\"og:description\" content=\"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-03T08:27:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-17T09:26:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Diego Loro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diego Loro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\",\"name\":\"Software security: come realizziamo applicazioni sicure in 6 step\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png\",\"datePublished\":\"2024-10-03T08:27:55+00:00\",\"dateModified\":\"2025-03-17T09:26:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66\"},\"description\":\"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png\",\"width\":1920,\"height\":1440,\"caption\":\"software security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software security: come realizziamo applicazioni sicure e resilienti, in 6 step\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66\",\"name\":\"Diego Loro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g\",\"caption\":\"Diego Loro\"},\"description\":\"Entrato in Intesys nel 2021, mi occupo di Project Management e Service Management. Prima di Intesys, dopo la laurea in ingegneria ho lavorato per 15 anni nel settore IT come Senior Java Developer, Software Architect e Project Manager di progettualit\u00e0 ad alto contenuto tecnologico.\",\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/diego-loro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software security: come realizziamo applicazioni sicure in 6 step","description":"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/","og_locale":"it_IT","og_type":"article","og_title":"Software security: come realizziamo applicazioni sicure in 6 step","og_description":"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/","og_site_name":"Intesys Journal","article_published_time":"2024-10-03T08:27:55+00:00","article_modified_time":"2025-03-17T09:26:30+00:00","og_image":[{"width":600,"height":250,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","type":"image\/jpeg"}],"author":"Diego Loro","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","twitter_misc":{"Scritto da":"Diego Loro","Tempo di lettura stimato":"8 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/","name":"Software security: come realizziamo applicazioni sicure in 6 step","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png","datePublished":"2024-10-03T08:27:55+00:00","dateModified":"2025-03-17T09:26:30+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66"},"description":"Per fare Software Security il codice non basta: ci vogliono processi, tool e best practice per creare app sicure. Ecco come facciamo","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2024\/10\/software_security.png","width":1920,"height":1440,"caption":"software security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"Software security: come realizziamo applicazioni sicure e resilienti, in 6 step"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66","name":"Diego Loro","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g","caption":"Diego Loro"},"description":"Entrato in Intesys nel 2021, mi occupo di Project Management e Service Management. Prima di Intesys, dopo la laurea in ingegneria ho lavorato per 15 anni nel settore IT come Senior Java Developer, Software Architect e Project Manager di progettualit\u00e0 ad alto contenuto tecnologico.","url":"https:\/\/www.intesys.it\/journal\/autore\/diego-loro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=14422"}],"version-history":[{"count":10,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14422\/revisions"}],"predecessor-version":[{"id":15088,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14422\/revisions\/15088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/14454"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=14422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=14422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=14422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}