This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→Table of content) |
MB netblue4 (talk | contribs) (→Preparation phase) |
||
| Line 135: | Line 135: | ||
== <b>Preparation phase</b>== | == <b>Preparation phase</b>== | ||
| − | When developing secure software | + | When developing secure software we need to consider both standard secure code and client specific architectural requirements |
| − | + | ||
| − | |||
| − | |||
| − | |||
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | ||
| − | === <b> | + | === <b>Standard secure code requirements</b>=== |
</div> | </div> | ||
<ul> | <ul> | ||
| − | + | <li><b>Information security and development team</b> use the <b>Internal mapping </b> screen to | |
| − | |||
| − | |||
| − | |||
| − | <li><b>Information security and development team</b> use the <b>Internal mapping </b> screen | ||
<ol> | <ol> | ||
| − | <li> | + | <li>Map the security requirements to OWASP risks</li> |
| − | <li> | + | <li>Map organisation approved secure code blocks to security requirements</li> |
| − | <li> | + | <li>Map security test plans to OWASP risks</li> |
[https://youtu.be/BXYk4oMue-M See how to setup the SCAT's internal mapping] | [https://youtu.be/BXYk4oMue-M See how to setup the SCAT's internal mapping] | ||
</ol> | </ol> | ||
| Line 158: | Line 151: | ||
</ul> | </ul> | ||
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | <div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt"> | ||
| − | === <b> | + | === <b>Client specific architectural requirements</b>=== |
</div> | </div> | ||
<ul> | <ul> | ||
<li>Organisations have environment specific security requirements, e.g. Log files in a format that can be consumed by SEIM, which DLP or authentication mechanism to use</li> | <li>Organisations have environment specific security requirements, e.g. Log files in a format that can be consumed by SEIM, which DLP or authentication mechanism to use</li> | ||
| − | <li> | + | <li>Organisations define environment specific risks, security requirements, secure code blocks and tests</li> |
| + | <li><b>Tool administrators</b> use the <b>Internal mapping </b> screen to | ||
<ol> | <ol> | ||
| − | <li>Create | + | <li>Create json files of the organisation specific risks, security requirements, secure code blocks and tests</li> |
| − | <li>Import | + | <li>Import these into the SCAT</li> |
[https://youtu.be/1pkgJlz_sLA See how to import organisations specific risks, security requirements, secure code blocks and tests] | [https://youtu.be/1pkgJlz_sLA See how to import organisations specific risks, security requirements, secure code blocks and tests] | ||
</ol> | </ol> | ||
Revision as of 08:04, 31 August 2019
Table of content
Description
Secure code assurance tool (SCAT) is used by inhouse and third party development teams to build, verify and assure secure software BuildVerifyAssure
SCAT performs the following “first line of defense” functions Benefits realisation: Enabling development teams to deliver at speedRisk optimisation: Minimise the negative and maximise the positive consequencesResource optimisation: Predictable, repeatable and consistent level of security across all teams
I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Preparation phaseWhen developing secure software we need to consider both standard secure code and client specific architectural requirements Standard secure code requirementsClient specific architectural requirements
How does the SCAT implement first line of defencePromoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision makingIntegrating security into the software development process
Who uses Secure code assurance tool (SCAT)LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications
| ||||||



