This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Process integrity tool vs point in time security verification tool)
Line 25: Line 25:
 
<li>Both types of tools are important and some applications have functionality that crosses the line</li>
 
<li>Both types of tools are important and some applications have functionality that crosses the line</li>
 
</ul>
 
</ul>
 
  
 
==Tools and SDLC==
 
==Tools and SDLC==

Revision as of 11:39, 30 September 2019

OWASP Project Header.jpg

What is the Secure code assurance tool (SCAT)

What SCAT does not do

  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

What SCAT does do

  • SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process
  • SCAT’s primary objective is proving security controls operate efficiently over a period of time

Process integrity tool vs point in time security verification tool

SOCTools
  • Point in time security verification tools relate to SOC2 Type 1 and assesses the design of security processes at a specific point in time
  • Process integrity tools relate to SOC2 Type 2 and assesses how effective those controls are over time
  • Both types of tools are important and some applications have functionality that crosses the line

Tools and SDLC

SDLC phase SCAT Process integrity tool Point in time security verification tool
Sprint planning Ensures security requirements are understood
  • Security requirements are enriched with environment specific contextual information and guidance before development begins
Relevant security requirements
  • Automatic scans generate security requirements to fix existing vulnerabilities
Develop Ensures correct implementation of security requirements
  • Code level guidance and automatic DAST tool scans to verify correct implementation
Secure code review Ensures correct implementation of security requirements
  • Manually review guidance and automatic SAST tool scans to verify manual review
Testing Ensures valid security testing
  • Secure test plans to guide correct implementation of security requirements
Approval Streamline audit/approval process
  • Providing one click traceability through requirements as evidence of secure development and testing
  • Using only point in time vulnerability detection tools will teach developers to fix vulnerabilities through trial and error. But when experienced developers leave the team, new developers have to learn by making the same costly mistakes again
  • Process integrity tools fix this problem by guiding and verifying correct implementation at each stage of the SDLC. Making security part of the process of building software and reducing the reliance on individuals