This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→Sprint planning phase) |
MB netblue4 (talk | contribs) |
||
Line 48: | Line 48: | ||
See below how the Secure code assurance tool integrates security into software development phases | See below how the Secure code assurance tool integrates security into software development phases | ||
<ul> | <ul> | ||
− | |||
==Sprint planning phase == | ==Sprint planning phase == | ||
− | |||
<b>Objective</b>: Ensures security requirements are understood <br> | <b>Objective</b>: Ensures security requirements are understood <br> | ||
</div> | </div> | ||
Line 68: | Line 66: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | |||
− | + | == <li>Development phase</li> == | |
<b>Objective</b>: Ensure correct implementation of security requirements<br> | <b>Objective</b>: Ensure correct implementation of security requirements<br> | ||
− | |||
<ul> | <ul> | ||
<li><b>Developers</b> use the <b>Secure development</b> screen to<br> | <li><b>Developers</b> use the <b>Secure development</b> screen to<br> | ||
Line 86: | Line 82: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | |||
− | + | == <li>Secure code review phase</li> == | |
<b>Objective</b>: Ensure correct implementation of security requirements<br> | <b>Objective</b>: Ensure correct implementation of security requirements<br> | ||
− | + | ||
<ul> | <ul> | ||
<li><b>Code reviewers</b> use the <b>Secure code review </b> screen to<br> | <li><b>Code reviewers</b> use the <b>Secure code review </b> screen to<br> | ||
Line 101: | Line 96: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | |||
− | + | == <li>Testing phase</li> == | |
<b>Objective</b>: Ensure valid security testing<br> | <b>Objective</b>: Ensure valid security testing<br> | ||
− | |||
<ul> | <ul> | ||
<li><b>Testers</b> use the <b>Secure testing</b> screen to<br> | <li><b>Testers</b> use the <b>Secure testing</b> screen to<br> | ||
Line 116: | Line 109: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | < | + | == <li>Approval phase</li> == |
− | + | <b>Objective</b>: Streamline the approval and audit process<br> | |
− | |||
− | |||
<ul> | <ul> | ||
<li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br> | <li><b>Approvers</b> use the <b>Assurance evidence </b> screen to<br> | ||
Line 131: | Line 122: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | + | == <li>Risk management</li> == | |
− | + | <b>Objective</b>: Enable risk managers to prioritise, plan and monitor mitigation efforts<br> | |
− | |||
− | |||
− | |||
− | |||
<ul> | <ul> | ||
<li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br> | <li><b>Risk managers</b> use the <b>Application risk exposure</b> screen to<br> | ||
Line 155: | Line 142: | ||
When developing secure software we need to consider both standard secure code and client specific architectural requirements | When developing secure software we need to consider both standard secure code and client specific architectural requirements | ||
− | + | == <b>Standard secure code requirements</b>== | |
− | + | ||
− | |||
<ul> | <ul> | ||
<li>SCAT comes out the box with a standard OWASP secure code requirements map. This mapping need to be modified to the specific organisation requirements</li> | <li>SCAT comes out the box with a standard OWASP secure code requirements map. This mapping need to be modified to the specific organisation requirements</li> | ||
Line 170: | Line 156: | ||
</li> | </li> | ||
</ul> | </ul> | ||
− | + | == <b>Client specific architectural requirements</b>== | |
− | |||
− | |||
</div> | </div> | ||
<ul> | <ul> |
Revision as of 11:21, 30 September 2019
What does SCAT not do
What does SCAT do
Process integrity tool vs point in time security verification tool
Build, Verify Assure
See below how the Secure code assurance tool integrates security into software development phases
Sprint planning phaseObjective: Ensures security requirements are understood
Objective: Ensure correct implementation of security requirements
Objective: Ensure correct implementation of security requirements
Objective: Ensure valid security testing
Objective: Streamline the approval and audit process
Objective: Enable risk managers to prioritise, plan and monitor mitigation efforts
When developing secure software we need to consider both standard secure code and client specific architectural requirements Standard secure code requirements
Client specific architectural requirements</div>
SCAT has the following governance objectives implemented by the following “first line of defense” functions Benefits realisation: Enabling development teams to deliver at speedRisk optimisation: Minimise the negative and maximise the positive consequencesResource optimisation: Predictable, repeatable and consistent level of security across all teams
Promoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications |