This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
Line 39: Line 39:
  
 
<h1><b>Problems the tool address</b></h1>
 
<h1><b>Problems the tool address</b></h1>
 +
==Low levels of compliance==
 
<ul>
 
<ul>
<li>Low levels of compliance: Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li>
+
<li Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li>
<li>Compliance and assurance seen as blockers: Approvers and assurance teams delay release while development teams do a post development, blind scramble for evidence to prove they have met security requirements</li>
+
</ul>
<li>Duplication of effort and inconsistent implementation: Complex application landscapes with multiple dev teams, application and technologies make it difficult to control and coordinate development and testing effort</li>
+
==Compliance and assurance seen as blockers==
 +
<ul>
 +
<li>Approvers and assurance teams delay release while development teams do a post development, blind scramble for evidence to prove they have met security requirements</li>
 +
</ul>
 +
==Duplication of effort and inconsistent implementation==
 +
<ul>
 +
<li>Complex application landscapes with multiple dev teams, application and technologies make it difficult to control and coordinate development and testing effort</li>
 
</ul>
 
</ul>
  

Revision as of 11:27, 30 September 2019

OWASP Project Header.jpg


What does SCAT not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What does SCAT do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line