This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Process integrity tool vs point in time security verification tool)
(How the two tools should be used in the SDLC)
Line 25: Line 25:
 
<li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li>  
 
<li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li>  
 
</ul>
 
</ul>
 
==How the two tools should be used in the SDLC==
 
 
 
 
<table border="1px">
 
  <tr>
 
  <td>SDLC phase</td>
 
  <td>SCAT Process integrity tool</td>
 
  <td>Point in time security verification tool</td>
 
  </tr>
 
  <tr>
 
  <td>Sprint planning</td>
 
  <td><strong>Ensures security requirements are understood </strong>
 
<ul>
 
<li>Security requirements are enriched with environment specific contextual information and guidance <span style="text-decoration:underline;">before development begins</span> </li>
 
</ul>
 
  </td>
 
  <td><strong>Relevant security requirements </strong>
 
<ul>
 
 
<li>Automatic scans generate security requirements to fix existing vulnerabilities
 
</li>
 
</ul>
 
  </td>
 
  </tr>
 
  <tr>
 
  <td>Develop
 
  </td>
 
  <td><strong>Ensures correct implementation of security requirements</strong>
 
<ul>
 
 
<li>Code level guidance and automatic DAST tool scans to verify correct implementation
 
</li>
 
</ul>
 
  </td>
 
  <td>
 
  </td>
 
  </tr>
 
  <tr>
 
  <td>Secure code review
 
  </td>
 
  <td><strong>Ensures correct implementation of security requirements</strong>
 
<ul>
 
 
<li>Manually review guidance and automatic SAST tool scans to verify manual review
 
</li>
 
</ul>
 
  </td>
 
  <td>
 
  </td>
 
  </tr>
 
  <tr>
 
  <td>Testing
 
  </td>
 
  <td><strong>Ensures valid security testing</strong>
 
<ul>
 
 
<li>Secure test plans to guide correct implementation of security requirements
 
</li>
 
</ul>
 
  </td>
 
  <td>
 
  </td>
 
  </tr>
 
  <tr>
 
  <td>Approval
 
  </td>
 
  <td><strong>Streamline audit/approval process </strong>
 
<ul>
 
<li>Providing one click traceability through requirements as evidence of secure development and testing
 
</li>
 
</ul>
 
  </td>
 
  <td>
 
  </td>
 
  </tr>
 
</table>
 
<ul>
 
<li>Using only point in time vulnerability detection tools will teach developers to fix vulnerabilities through trial and error.  But when experienced developers leave the team, new developers have to learn by making the same costly mistakes again</li>
 
<li>Process integrity tools fix this problem by guiding and verifying correct implementation at each stage of the SDLC.  Making security part of the process of building software and reducing the reliance on individuals</li>
 
 
 
 
<h1><b>Description</b></h1>
 
  
 
==Build,  Verify Assure==
 
==Build,  Verify Assure==

Revision as of 07:58, 7 October 2019

OWASP Project Header.jpg

What is the Secure code assurance tool (SCAT)

What SCAT does not do

  • SCAT is a process integrity tool, implementing a consistent, authorized and auditable software development process
  • SCAT is used by development teams to build, verify and assure secure software
    • Build: uses a combination of code level guidance, on demand training and DAST tools to train, guide and verify correct implementation
    • Verify: uses a combination of manual test plans and SATS tools to guide and verify correct implementation
    • Assure: centrally stores and publishes evidence of secure development and testing as an audit trail. Providing traceability through requirements and proving that security controls operate efficiently over a period of time
  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

Build, Verify Assure

  • SCAT is used by development teams to build, verify and assure secure software
  • Build: SCAT uses code level guidance to clearly instructs developers on how to correctly implement security requirements
  • Verify: SCAT uses a combination of ZAP basic scans and security test plans to verify correct implementation of security requirements
  • Assure: SCAT centrally stores and publishes evidence of secure development and testing as an audit trail. Providing traceability through requirements and proving a secure development process
  • SCAT is a simple 5 screen MVC, C# web application with a small footprint that can be deployed without further complicating development environment
  • SCAT is part of three domains to consider when securing software development. I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.