A logiciel development and security testing model where one team builds the software, a second team tries to break it (find vulnerabilities), and the original team fixes them.
- Méthodologies : Ingénierie, Conception de Produits, Gestion de projet
Build It Break It Fix It

Build It Break It Fix It
- Emulation de l'adversaire, Méthodologie Agile, Amélioration continue, Cybersecurity, Assurance qualité, Contrôle de qualité, Gestion des risques, Software Testing
Objectif :
Comment il est utilisé :
- This model is often used in security competitions or internal security reviews to rigorously test a system's defenses by simulating attacks from a dedicated 'break-it' team.
Avantages
- Promotes a security-conscious development culture, effectively identifies vulnerabilities through a dedicated adversarial approach, and provides a realistic test of system resilience.
Inconvénients
- Can be resource-intensive and time-consuming, may create an adversarial relationship between teams, and is more focused on security than general functionality bugs.
Catégories :
- Ingénierie, Qualité, Gestion des risques
Idéal pour :
- Rigorously testing the security of software by having dedicated teams for building and attacking the system.
The Build It Break It Fix It methodology is widely applied in various industries such as information technology, telecommunications, and financial services, particularly during the design and development phases of software and infrastructure systems. This approach can be initiated by internal security teams, independent security consultants, or even external bug bounty programs that encourage participation from ethical hackers and security researchers. Participants typically include software developers, security analysts, and system architects who collaborate to construct the system while simultaneously engaging a dedicated ‘break-it’ team tasked with launching simulated attacks to uncover vulnerabilities. This methodology proves beneficial in environments where high-stakes data protection is required, as seen in sectors like healthcare and e-commerce, where data breaches can have severe consequences. During the project’s lifecycle, iterative cycles of building, testing by attacking, and then fixing identified vulnerabilities support continuous improvement and reinforce a proactive security posture. This iterative approach also enhances communication among team members, as developers receive direct feedback from testers, encouraging a culture of secure coding practices. Conducting these exercises regularly ensures that security measures evolve in tandem with emerging threats, making systems robust against potential attacks.
Principales étapes de cette méthodologie
- Design and implement the software product with security best practices embedded in the process.
- Formulate an attack plan that includes various threat models and attack vectors.
- Execute simulated attacks on the system using the pre-defined scenarios.
- Document each vulnerability discovered during the attack phase for analysis.
- Prioritize vulnerabilities based on severity and potential impact on the system.
- Develop and apply fixes for the identified vulnerabilities and weaknesses.
- Re-test the system post-fix to ensure vulnerabilities have been effectively addressed.
- Iterate through the build, break, and fix cycle as needed to enhance security continuously.
Conseils de pro
- Conduct post-attack reviews to refine both build and break strategies, ensuring lessons from each test are integrated into the development process.
- Utilize automated tools alongside manual testing for comprehensive coverage, identifying potential vulnerabilities more efficiently and consistently.
- Rotate team roles regularly between builders and breakers to enhance empathy and understanding of each perspective, leading to more robust design choices.
Lire et comparer plusieurs méthodologies, nous recommandons le
> Référentiel méthodologique étendu <
ainsi que plus de 400 autres méthodologies.
Vos commentaires sur cette méthodologie ou des informations supplémentaires sont les bienvenus sur le site web de la Commission européenne. section des commentaires ci-dessous ↓ , ainsi que toute idée ou lien en rapport avec l'ingénierie.
Articles Similaires
Questionnaires sur les troubles musculo-squelettiques
Tests à plusieurs variables (MVT)
Analyse de régression multiple
Systèmes de capture de mouvement
Méthode MoSCoW
Test de la médiane de Mood