This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Low levels of compliance)
Line 41: Line 41:
 
==Low levels of compliance==
 
==Low levels of compliance==
 
<ul>
 
<ul>
<li Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li>
+
<li> Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li>
 
</ul>
 
</ul>
 +
 
==Compliance and assurance seen as blockers==
 
==Compliance and assurance seen as blockers==
 
<ul>
 
<ul>

Revision as of 11:27, 30 September 2019

OWASP Project Header.jpg


What does SCAT not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What does SCAT do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line