1. Have a vuln response process, use it to learn, and fix more than just what’s reported.
2. Devs are accountable for writing secure code—don’t “test it in.”
3. Do RCAs
5. Have a bug bar — exploitability matters.
6. Secure your 3rd party code. If you ship it, it’s your problem.
8. Inform and motivate your developer population. (Context is powerful)
9. Then you can train—the more targeted to your environment the better.
11. Don’t roll your own security features if security isn’t your core biz.
The platform can be your friend.
12. Minimize your attack surface.
So the good Dr just shared at least dozen ways that SDL, indeed, doesn’t have to break the bank.