This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) (→Description) |
MB netblue4 (talk | contribs) (→Problems the tool address) |
||
Line 46: | Line 46: | ||
</ul> | </ul> | ||
− | + | <h1><b>Problems the tool address</b></h1> | |
<ul> | <ul> | ||
<li>Low levels of compliance: Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li> | <li>Low levels of compliance: Development teams don’t have the time to study and understand the complex security requirements and don’t know how to write code or test code that implements it</li> |
Revision as of 11:03, 30 September 2019
Table of content
What does SCAT not do
What does SCAT do
Process integrity tool vs point in time security verification tool
See how developers use SCATSee below how the Secure code assurance tool integrates security into software development phases
Objective: Ensures security requirements are understood
Objective: Ensure correct implementation of security requirements
Objective: Ensure correct implementation of security requirements
Objective: Ensure valid security testing
Objective: Streamline the approval and audit process
Objective: Enable risk managers to prioritise, plan and monitor mitigation efforts
Preparation phaseWhen developing secure software we need to consider both standard secure code and client specific architectural requirements Standard secure code requirements
Client specific architectural requirements
Governance, first line of defence and SCATSCAT has the following governance objectives implemented by the following “first line of defense” functions Benefits realisation: Enabling development teams to deliver at speedRisk optimisation: Minimise the negative and maximise the positive consequencesResource optimisation: Predictable, repeatable and consistent level of security across all teams
Promoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications |