This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
MB netblue4 (talk | contribs) |
MB netblue4 (talk | contribs) |
||
Line 7: | Line 7: | ||
<h1><b>What is the Secure code assurance tool</b></h1> | <h1><b>What is the Secure code assurance tool</b></h1> | ||
− | + | ==What does SCAT not do == | |
<ul> | <ul> | ||
<li>SCAT is <strong><span style="text-decoration:underline;">not</span></strong> a point in time security verification tool for <strong><span style="text-decoration:underline;">detecting</span></strong> vulnerabilities after development</li> | <li>SCAT is <strong><span style="text-decoration:underline;">not</span></strong> a point in time security verification tool for <strong><span style="text-decoration:underline;">detecting</span></strong> vulnerabilities after development</li> | ||
</ul> | </ul> | ||
− | + | ==What does SCAT do== | |
<ul> | <ul> | ||
<li>SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process</li> | <li>SCAT is a process integrity tool which implements a consistent, authorized and auditable software development process</li> | ||
<li>SCAT’s primary objective is proving security controls operate efficiently over a period of time</li> | <li>SCAT’s primary objective is proving security controls operate efficiently over a period of time</li> | ||
</ul> | </ul> | ||
− | + | ==Process integrity tool vs point in time security verification tool== | |
[[File:SOC tools Point in time.png|thumb|SOCTools]] | [[File:SOC tools Point in time.png|thumb|SOCTools]] | ||
<ul> | <ul> |
Revision as of 11:18, 30 September 2019
What does SCAT not do
What does SCAT do
Process integrity tool vs point in time security verification tool
Build, Verify Assure
See below how the Secure code assurance tool integrates security into software development phases
Objective: Ensures security requirements are understood
Objective: Ensure correct implementation of security requirements
Objective: Ensure correct implementation of security requirements
Objective: Ensure valid security testing
Objective: Streamline the approval and audit process
Objective: Enable risk managers to prioritise, plan and monitor mitigation efforts
When developing secure software we need to consider both standard secure code and client specific architectural requirements Standard secure code requirements
Client specific architectural requirements
SCAT has the following governance objectives implemented by the following “first line of defense” functions Benefits realisation: Enabling development teams to deliver at speedRisk optimisation: Minimise the negative and maximise the positive consequencesResource optimisation: Predictable, repeatable and consistent level of security across all teams
Promoting compliance to security requirements
Minimising the impact of audit and assurance
Informing risk based decision making
Integrating security into the software development process
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Project Resources[Installation Package] [Source Code] Project LeaderClassifications |