This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Client specific architectural requirements)
(Standard secure code requirements)
Line 142: Line 142:
 
When developing secure software we need to consider both standard secure code and client specific architectural requirements
 
When developing secure software we need to consider both standard secure code and client specific architectural requirements
  
== <b>Standard secure code requirements</b>==
+
== Standard secure code requirements==
  
 
<ul>
 
<ul>
Line 156: Line 156:
 
       </li>
 
       </li>
 
  </ul>
 
  </ul>
 +
 
== <b>Client specific architectural requirements</b>==
 
== <b>Client specific architectural requirements</b>==
  

Revision as of 11:22, 30 September 2019

OWASP Project Header.jpg


What does SCAT not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What does SCAT do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line