This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→Secure code review phase) |
MB netblue4 (talk | contribs) (→What is the Secure code assurance tool) |
||
| Line 13: | Line 13: | ||
==<b>What is the Secure code assurance tool</b> == | ==<b>What is the Secure code assurance tool</b> == | ||
| + | <h2>What does SCAT not do </h2> | ||
<ul> | <ul> | ||
| − | <li> | + | <li>SCAT is <strong><span style="text-decoration:underline;">not</span></strong> a point in time security verification tool for <strong><span style="text-decoration:underline;">detecting</span></strong> vulnerabilities after development</li> |
| − | < | + | </ul> |
| − | + | <h2>What does SCAT do</h2> | |
| − | + | <ul> | |
| − | <li>SCAT is a process integrity tool | + | <li>SCAT is a process integrity tool implementing a consistent, authorized and auditable software development process</li> |
| − | + | <li>SCAT’s primary objective is proving security controls operate efficiently over a period of time and <strong><span style="text-decoration:underline;">preventing</span></strong> vulnerabilities from reaching or recurring in production</li> | |
| − | + | <li>SCAT uses free OWASP SAST and DAST tools (point in time security verification tool)</li> | |
| − | <li>SCAT | + | <li>These are deployed in local docker containers as on demand verification tools, that development teams can run on localhost for immediate pre-checkin verification</li> |
</ul> | </ul> | ||
Revision as of 04:11, 30 September 2019
Table of content
What is the Secure code assurance toolWhat does SCAT not do
What does SCAT do
Description
SCAT is used by inhouse and third party development teams to build, verify and assure secure software BuildVerifyAssure
SCAT has the following governance objectives implemented by the following “first line of defense” functions Benefits realisation: Enabling development teams to deliver at speedRisk optimisation: Minimise the negative and maximise the positive consequencesResource optimisation: Predictable, repeatable and consistent level of security across all teams
I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Objective: Enabling developers to generate security requirements before development begins
Objective: Consistent and correct implementation of security requirements across all teams
Objective: Consistent and correct implementation of security requirements
Objective: Guide the secure testing process
Objective: Streamline the approval and audit process
Objective: Enable risk managers to prioritise, plan and monitor mitigation efforts
Preparation phaseWhen developing secure software we need to consider both standard secure code and client specific architectural requirements Standard secure code requirements
Client specific architectural requirements
How does the SCAT implement first line of defencePromoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications
| ||||||



