This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(Build, Verify Assure)
(What SCAT does not do)
Line 25: Line 25:
 
<li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li>  
 
<li>SCAT is <span style="text-decoration:underline;">not a point in time security verification tool </span>for detecting vulnerabilities after development</li>  
 
</ul>
 
</ul>
 
 
<h1><b>Problems the tool address</b></h1>
 
  
 
==Low levels of compliance==
 
==Low levels of compliance==

Revision as of 08:01, 7 October 2019

OWASP Project Header.jpg

What is the Secure code assurance tool (SCAT)

What SCAT does not do

  • SCAT is a process integrity tool, implementing a consistent, authorized and auditable software development process
  • SCAT is used by development teams to build, verify and assure secure software
    • Build: uses a combination of code level guidance, on demand training and DAST tools to train, guide and verify correct implementation
    • Verify: uses a combination of manual test plans and SATS tools to guide and verify correct implementation
    • Assure: centrally stores and publishes evidence of secure development and testing as an audit trail. Providing traceability through requirements and proving that security controls operate efficiently over a period of time
  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

Low levels of compliance

  • Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it

Compliance and assurance seen as blockers

  • Approvers and assurance teams delay release while development teams do a post development, blind scramble for evidence to prove they have met security requirements

Duplication of effort and inconsistent implementation

  • Complex application landscapes with multiple dev teams, application and technologies make it difficult to control and coordinate development and testing effort