This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→See how developers use SCAT) |
MB netblue4 (talk | contribs) (→See how developers use SCAT) |
||
| Line 29: | Line 29: | ||
=== <li>Sprint planning phase</li> === | === <li>Sprint planning phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Developers</b> use the <b>Identify risks</b> screen<br> | + | <li><b>Developers</b> use the <b>Identify risks</b> screen to<br> |
<ol> | <ol> | ||
<li>Select the application critical function they are developing/changing</li> | <li>Select the application critical function they are developing/changing</li> | ||
| Line 36: | Line 36: | ||
[https://youtu.be/WQVzthyGL4U See how to use the tools and its internal mapping to generate security requirements] | [https://youtu.be/WQVzthyGL4U See how to use the tools and its internal mapping to generate security requirements] | ||
</ol> | </ol> | ||
| − | <li><b>Product owners</b> use the <b>Secure code requirements</b> screen<br> | + | <li><b>Product owners</b> use the <b>Secure code requirements</b> screen to<br> |
<ol> | <ol> | ||
<li>Export security requirements for import into backlog management tools</li> | <li>Export security requirements for import into backlog management tools</li> | ||
| Line 45: | Line 45: | ||
=== <li>Development phase</li> === | === <li>Development phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Developers</b> use the <b>Secure development</b> screen <br> | + | <li><b>Developers</b> use the <b>Secure development</b> screen to<br> |
<ol> | <ol> | ||
<li>View and understand how to attack and prevent the risks associated with the critical function</li> | <li>View and understand how to attack and prevent the risks associated with the critical function</li> | ||
| Line 58: | Line 58: | ||
=== <li>Testing phase</li> === | === <li>Testing phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Testers</b> use the <b>Secure testing</b> screen<br> | + | <li><b>Testers</b> use the <b>Secure testing</b> screen to<br> |
<ol> | <ol> | ||
<li>View the test plans required to test the risk</li> | <li>View the test plans required to test the risk</li> | ||
| Line 70: | Line 70: | ||
=== <li>Approval phase</li> === | === <li>Approval phase</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen<br> | + | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br> |
<ol> | <ol> | ||
<li>View relevant testing evidence alongside the risk, reducing the time assurance teams need to examine and approve releases</li> | <li>View relevant testing evidence alongside the risk, reducing the time assurance teams need to examine and approve releases</li> | ||
| Line 81: | Line 81: | ||
=== <li>Risk management</li> === | === <li>Risk management</li> === | ||
<ul> | <ul> | ||
| − | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen<br> | + | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br> |
<ol> | <ol> | ||
<li>View each application critical function and the associated risks</li> | <li>View each application critical function and the associated risks</li> | ||
Revision as of 11:47, 29 August 2019
Description
I've detailed the other domains in an article that will be published in the Nov/Dec issue of the ISC2 magazine, I will add a link here after publication.
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Preparation phaseWhen developing secure software the SCAT helps development teams Write secure code
Safely deploy in organisation environmentCreate environment specific security requirementsImport environment specific security requirements
How does the SCAT implement first line of defencePromoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
Who uses Secure code assurance tool (SCAT)LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications
| ||||||



