This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→Description) |
MB netblue4 (talk | contribs) (→See how developers use SCAT) |
||
| Line 25: | Line 25: | ||
== <b>See how developers use SCAT</b>== | == <b>See how developers use SCAT</b>== | ||
| − | See below how the | + | See below how the Secure code assurance tool integrates security into software development phases |
<ul> | <ul> | ||
=== <li>Sprint planning phase</li> === | === <li>Sprint planning phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Developers</b> use the <b>Identify risks</b> screen<br> | + | <li><b>Developers</b> use the <b>Identify risks</b> screen<br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>Select the application critical function they are developing/changing</li> |
| − | <li> | + | <li>Identify the technologies they are using to develop/change the application critical function</li> |
<li>The Secure code assurance tools uses its internal mapping to automatically generate the security requirements associated with using this technology</li> | <li>The Secure code assurance tools uses its internal mapping to automatically generate the security requirements associated with using this technology</li> | ||
[https://youtu.be/WQVzthyGL4U See how to use the tools and its internal mapping to generate security requirements] | [https://youtu.be/WQVzthyGL4U See how to use the tools and its internal mapping to generate security requirements] | ||
</ol> | </ol> | ||
| − | <li><b>Product owners</b> use the <b>Secure code requirements</b> screen<br> | + | <li><b>Product owners</b> use the <b>Secure code requirements</b> screen<br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>Export security requirements for import into backlog management tools</li> |
</ol> | </ol> | ||
</li> | </li> | ||
| Line 45: | Line 45: | ||
=== <li>Development phase</li> === | === <li>Development phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Developers</b> use the <b>Secure development</b> screen <br> | + | <li><b>Developers</b> use the <b>Secure development</b> screen <br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>View and understand how to attack and prevent the risks associated with the critical function</li> |
| − | <li> | + | <li>View the secure code requirements to protect against exploitation</li> |
| − | <li> | + | <li>View the secure code block to implement the security requirement</li> |
| − | <li>After development run a ZAP basic scan to verify security requirements have been correctly implemented </li> | + | <li>After development run a ZAP basic scan to verify security requirements have been correctly implemented</li> |
[https://youtu.be/8J8KMaPnGOs See how the tool helps developers understand security requirements and write secure code] | [https://youtu.be/8J8KMaPnGOs See how the tool helps developers understand security requirements and write secure code] | ||
</ol> | </ol> | ||
| Line 58: | Line 58: | ||
=== <li>Testing phase</li> === | === <li>Testing phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Testers</b> use the <b>Secure testing</b> screen<br> | + | <li><b>Testers</b> use the <b>Secure testing</b> screen<br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>View the test plans required to test the risk</li> |
| − | <li> | + | <li>Attach testing result to the test plan as control assurance evidence proving the risk has been mitigated</li> |
<li>The Secure code assurance tool does not integrate with any testing tools other than OWASP ZAP. Testing results generated outside of the secure code assurance tool is manually uploaded and stored</li> | <li>The Secure code assurance tool does not integrate with any testing tools other than OWASP ZAP. Testing results generated outside of the secure code assurance tool is manually uploaded and stored</li> | ||
[https://youtu.be/VixapzUB_ts See how the tool helps testers test risk mitigation efforts and store testing evidence] | [https://youtu.be/VixapzUB_ts See how the tool helps testers test risk mitigation efforts and store testing evidence] | ||
| Line 70: | Line 70: | ||
=== <li>Approval phase</li> === | === <li>Approval phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen<br> | + | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen<br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>View relevant testing evidence alongside the risk, reducing the time assurance teams need to examine and approve releases</li> |
| − | <li> | + | <li>View how many of the tests have test results and whether it falls within risk tolerance levels</li> |
[https://youtu.be/VixapzUB_ts See how the tool streamlines the approval process with centrally stored testing evidence] | [https://youtu.be/VixapzUB_ts See how the tool streamlines the approval process with centrally stored testing evidence] | ||
</ol> | </ol> | ||
| Line 81: | Line 81: | ||
=== <li>Risk management</li> === | === <li>Risk management</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen<br> | + | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen<br> to |
<ol> | <ol> | ||
| − | <li> | + | <li>View each application critical function and the associated risks</li> |
| − | <li> | + | <li>Identify where mitigation effort is required by viewing which risks require security requirements</li> |
| − | <li> | + | <li>Identify where development effort is required by viewing which security requirements need secure code blocks</li> |
| + | <li>Identify where extra testing effort is required by viewing which risks require security test plans</li> | ||
[https://youtu.be/8pKxorPSq_M See how the Application landscape overview screen informs risk based decision making] | [https://youtu.be/8pKxorPSq_M See how the Application landscape overview screen informs risk based decision making] | ||
</ol> | </ol> | ||
Revision as of 11:46, 29 August 2019
Description
I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Preparation phaseWhen developing secure software the SCAT helps development teams Write secure code
Safely deploy in organisation environmentCreate environment specific security requirementsImport environment specific security requirements
How does the SCAT implement first line of defencePromoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
Who uses Secure code assurance tool (SCAT)LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications
| ||||||



