This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→See how developers use SCAT) |
MB netblue4 (talk | contribs) (→See how developers use SCAT) |
||
| Line 27: | Line 27: | ||
See below how the Secure code assurance tool integrates security into software development phases | See below how the Secure code assurance tool integrates security into software development phases | ||
<ul> | <ul> | ||
| − | < | + | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> |
=== <li>Sprint planning phase</li> === | === <li>Sprint planning phase</li> === | ||
| − | </ | + | </div> |
<ul> | <ul> | ||
<li><b>Developers</b> use the <b>Identify risks</b> screen to<br> | <li><b>Developers</b> use the <b>Identify risks</b> screen to<br> | ||
| Line 44: | Line 44: | ||
</li> | </li> | ||
</ul> | </ul> | ||
| − | + | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | |
=== <li>Development phase</li> === | === <li>Development phase</li> === | ||
| + | </div> | ||
<ul> | <ul> | ||
<li><b>Developers</b> use the <b>Secure development</b> screen to<br> | <li><b>Developers</b> use the <b>Secure development</b> screen to<br> | ||
| Line 57: | Line 58: | ||
</li> | </li> | ||
</ul> | </ul> | ||
| − | + | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | |
=== <li>Testing phase</li> === | === <li>Testing phase</li> === | ||
| + | </div> | ||
<ul> | <ul> | ||
<li><b>Testers</b> use the <b>Secure testing</b> screen to<br> | <li><b>Testers</b> use the <b>Secure testing</b> screen to<br> | ||
| Line 69: | Line 71: | ||
</li> | </li> | ||
</ul> | </ul> | ||
| − | + | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | |
=== <li>Approval phase</li> === | === <li>Approval phase</li> === | ||
| + | </div> | ||
<ul> | <ul> | ||
<li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br> | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br> | ||
| Line 80: | Line 83: | ||
</li> | </li> | ||
</ul> | </ul> | ||
| − | + | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | |
=== <li>Risk management</li> === | === <li>Risk management</li> === | ||
| + | </div> | ||
<ul> | <ul> | ||
<li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br> | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br> | ||
Revision as of 12:21, 29 August 2019
Description
I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Preparation phaseWhen developing secure software the SCAT helps development teams Write secure codeSafely deploy in organisation environmentSee how to import organisations specific risks, security requirements, secure code blocks and tests
How does the SCAT implement first line of defencePromoting compliance to security requirementsMinimising the impact of audit and assurance
Informing risk based decision makingIntegrating security into the software development process
Who uses Secure code assurance tool (SCAT)LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications
| ||||||



