
Techniques, Practices and Reference guides: Security Patterns, Software Patterns, 
Antipatterns and Best Practices [20]. 
Main Roles: Security Engineer, Security Architects, Security Expert, Security 
Developer, Integrator Engineer, and D&D Team. 
Test Stage. After integrating the system’s hardware (HW) and SW components, it is 
necessary to ensure that they function correctly and that they fulfil that which is 
indicated in the previous stage, before being handed over to the final user.  
Activities: The activities in this stage are: 
•  A1: Design of operation tests. The guidelines concerning how to act are defined to 
verify that the functioning of the system which has been developed is correct 
(communication, performance, accessibility tests, etc.). 
•  A2: Execution of operation tests. The correct functioning of the system is verified, 
in addition to verifying that the pieces of HW and SW of which it is composed are 
well developed and configured, and that connectivity exists between them.  
•  A3: Design the Security Test Patterns. The reusable patterns repository is by 
relating the Security Patterns to their associated Security Test Patterns, if they do 
not yet exist. The following will be defined in these patterns: Test to be carried out; 
Planning of Test; Personnel who will carry out the Test; And tools, resources and 
mechanisms necessary to carry out the security Test in the infrastructure proposed 
by the pattern. The Test will be carried out on the basis of the vulnerabilities of the 
technology, the operative systems, the SW, the HW, etc. The tests will consist of 
ethical hacking, intrusion tests, error and code quality tests, fault tolerance, backup 
systems, verification of militarization of machines and operative systems, and 
verification of activity register logs. 
•  A4: Execution of security tests. The security tests defined in the previous stage are 
carried out to certify that the system is secure. These tests are carried out in the 
setting designed for this purpose – the unified test setting.  
•  A5: Evaluation of tests. The creation of a report containing the results of the tests 
that certify that the system which has been developed is secure. In the case of 
discovering any faults in the configuration, or in the code or vulnerability in the 
system, the infrastructure is reviewed in an iterative manner by following the 
activities from the previous stage.  
•  A6: Approval of the system developed. Once the system has been developed and 
both its functioning and security have been verified, the system is certified as being 
ideal to satisfy the business model proposed in the project. Later, the system will 
be promoted to the production setting and will be available to the final user.  
•  A7: Monitoring the system. The system is now monitored on the basis of the 
guidelines defined by the Maintenance Pattern in order to discover any future 
anomalies, faults, output problems, vulnerabilities or deficiencies occasioned by 
the passage of time and the evolution of both the HW and SW systems and the 
tactics and tools used by attackers.  
Input artifacts: Output artifact of the Construction stage, Technical and Security 
infrastructure manual, Security Patterns and Reusable Patterns Repository. 
 Output artifacts: Test Model, Test Patterns, User Manuals, and Test Manuals and 
Tested Secure system. 
 Techniques, Practices and Reference guides: Monitoring, Ethical Hacking, 
Hardening, Test reviews, and Misuse Patterns, Test Patterns. 
66