This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Sprint planning phase)
Line 48: Line 48:
 
See below how the Secure code assurance tool integrates security into software development phases
 
See below how the Secure code assurance tool integrates security into software development phases
 
<ul>
 
<ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
 
 
==Sprint planning phase ==
 
==Sprint planning phase ==
 
 
<b>Objective</b>: Ensures security requirements are understood <br>
 
<b>Objective</b>: Ensures security requirements are understood <br>
 
</div>
 
</div>
Line 68: Line 66:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
 
  
=== <li>Development phase</li> ===
+
== <li>Development phase</li> ==
  
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
</div>
 
 
     <ul>
 
     <ul>
 
         <li><b>Developers</b> use the <b>Secure development</b> screen to<br>
 
         <li><b>Developers</b> use the <b>Secure development</b> screen to<br>
Line 86: Line 82:
 
       </li>
 
       </li>
 
   </ul>
 
   </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
 
  
=== <li>Secure code review phase</li> ===
+
== <li>Secure code review phase</li> ==
  
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
</div>
+
 
 
     <ul>
 
     <ul>
 
         <li><b>Code reviewers</b> use the <b>Secure code review </b> screen to<br>
 
         <li><b>Code reviewers</b> use the <b>Secure code review </b> screen to<br>
Line 101: Line 96:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
 
  
=== <li>Testing phase</li> ===
+
== <li>Testing phase</li> ==
  
 
<b>Objective</b>: Ensure valid security testing<br>
 
<b>Objective</b>: Ensure valid security testing<br>
</div>
 
 
     <ul>
 
     <ul>
 
         <li><b>Testers</b> use the <b>Secure testing</b> screen to<br>
 
         <li><b>Testers</b> use the <b>Secure testing</b> screen to<br>
Line 116: Line 109:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
+
== <li>Approval phase</li> ==
  
=== <li>Approval phase</li> ===
+
<b>Objective</b>: Streamline the approval and audit process<br>
  
<b>Objective</b>: Streamline the approval and audit process<br>
 
</div>
 
 
<ul>
 
<ul>
 
         <li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br>
 
         <li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br>
Line 131: Line 122:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
+
== <li>Risk management</li> ==
 
+
<b>Objective</b>: Enable risk managers to prioritise, plan and monitor mitigation efforts<br>
=== <li>Risk management</li> ===
 
 
 
  
<b>Objective</b>: Enable risk managers to prioritise, plan and monitor mitigation efforts<br>
 
</div>
 
 
     <ul>
 
     <ul>
 
         <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br>
 
         <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br>
Line 155: Line 142:
 
When developing secure software we need to consider both standard secure code and client specific architectural requirements
 
When developing secure software we need to consider both standard secure code and client specific architectural requirements
  
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
+
== <b>Standard secure code requirements</b>==
=== <b>Standard secure code requirements</b>===
+
 
</div>
 
 
<ul>
 
<ul>
 
         <li>SCAT comes out the box with a standard OWASP secure code requirements map. This mapping need to be modified to the specific organisation requirements</li>
 
         <li>SCAT comes out the box with a standard OWASP secure code requirements map. This mapping need to be modified to the specific organisation requirements</li>
Line 170: Line 156:
 
       </li>
 
       </li>
 
  </ul>
 
  </ul>
<div style="background-color:#F2F0F0; padding-left:5pt; padding-bottom:5pt">
+
== <b>Client specific architectural requirements</b>==
 
 
=== <b>Client specific architectural requirements</b>===
 
 
</div>
 
</div>
 
<ul>
 
<ul>

Revision as of 11:21, 30 September 2019

OWASP Project Header.jpg


What does SCAT not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What does SCAT do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line