|
|
Line 25: |
Line 25: |
| <li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li> | | <li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li> |
| </ul> | | </ul> |
− |
| |
− | ==How the two tools should be used in the SDLC==
| |
− |
| |
− |
| |
− |
| |
− | <table border="1px">
| |
− | <tr>
| |
− | <td>SDLC phase</td>
| |
− | <td>SCAT Process integrity tool</td>
| |
− | <td>Point in time security verification tool</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Sprint planning</td>
| |
− | <td><strong>Ensures security requirements are understood </strong>
| |
− | <ul>
| |
− | <li>Security requirements are enriched with environment specific contextual information and guidance <span style="text-decoration:underline;">before development begins</span> </li>
| |
− | </ul>
| |
− | </td>
| |
− | <td><strong>Relevant security requirements </strong>
| |
− | <ul>
| |
− |
| |
− | <li>Automatic scans generate security requirements to fix existing vulnerabilities
| |
− | </li>
| |
− | </ul>
| |
− | </td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Develop
| |
− | </td>
| |
− | <td><strong>Ensures correct implementation of security requirements</strong>
| |
− | <ul>
| |
− |
| |
− | <li>Code level guidance and automatic DAST tool scans to verify correct implementation
| |
− | </li>
| |
− | </ul>
| |
− | </td>
| |
− | <td>
| |
− | </td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Secure code review
| |
− | </td>
| |
− | <td><strong>Ensures correct implementation of security requirements</strong>
| |
− | <ul>
| |
− |
| |
− | <li>Manually review guidance and automatic SAST tool scans to verify manual review
| |
− | </li>
| |
− | </ul>
| |
− | </td>
| |
− | <td>
| |
− | </td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Testing
| |
− | </td>
| |
− | <td><strong>Ensures valid security testing</strong>
| |
− | <ul>
| |
− |
| |
− | <li>Secure test plans to guide correct implementation of security requirements
| |
− | </li>
| |
− | </ul>
| |
− | </td>
| |
− | <td>
| |
− | </td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Approval
| |
− | </td>
| |
− | <td><strong>Streamline audit/approval process </strong>
| |
− | <ul>
| |
− | <li>Providing one click traceability through requirements as evidence of secure development and testing
| |
− | </li>
| |
− | </ul>
| |
− | </td>
| |
− | <td>
| |
− | </td>
| |
− | </tr>
| |
− | </table>
| |
− | <ul>
| |
− | <li>Using only point in time vulnerability detection tools will teach developers to fix vulnerabilities through trial and error. But when experienced developers leave the team, new developers have to learn by making the same costly mistakes again</li>
| |
− | <li>Process integrity tools fix this problem by guiding and verifying correct implementation at each stage of the SDLC. Making security part of the process of building software and reducing the reliance on individuals</li>
| |
− |
| |
− |
| |
− |
| |
− | <h1><b>Description</b></h1>
| |
| | | |
| ==Build, Verify Assure== | | ==Build, Verify Assure== |