This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Client specific architectural requirements)
Line 47: Line 47:
 
<h1><b>See how developers use SCAT</b></h1>
 
<h1><b>See how developers use SCAT</b></h1>
 
See below how the Secure code assurance tool integrates security into software development phases
 
See below how the Secure code assurance tool integrates security into software development phases
<ul>
+
 
 
==Sprint planning phase ==
 
==Sprint planning phase ==
 
<b>Objective</b>: Ensures security requirements are understood <br>
 
<b>Objective</b>: Ensures security requirements are understood <br>
Line 67: Line 67:
 
     </ul>
 
     </ul>
  
== <li>Development phase</li> ==
+
== Development phase ==
  
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
Line 83: Line 83:
 
   </ul>
 
   </ul>
  
== <li>Secure code review phase</li> ==
+
== Secure code review phase ==
  
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
 
<b>Objective</b>: Ensure correct implementation of security requirements<br>
Line 97: Line 97:
 
     </ul>
 
     </ul>
  
== <li>Testing phase</li> ==
+
== Testing phase==
  
 
<b>Objective</b>: Ensure valid security testing<br>
 
<b>Objective</b>: Ensure valid security testing<br>
Line 109: Line 109:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
== <li>Approval phase</li> ==
+
== Approval phase ==
  
 
<b>Objective</b>: Streamline the approval and audit process<br>
 
<b>Objective</b>: Streamline the approval and audit process<br>
Line 122: Line 122:
 
       </li>
 
       </li>
 
     </ul>
 
     </ul>
== <li>Risk management</li> ==
+
== Risk management ==
 
<b>Objective</b>: Enable risk managers to prioritise, plan and monitor mitigation efforts<br>
 
<b>Objective</b>: Enable risk managers to prioritise, plan and monitor mitigation efforts<br>
  

Revision as of 11:25, 30 September 2019

OWASP Project Header.jpg


What does SCAT not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What does SCAT do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line