This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Security Integration System"
From OWASP
MB netblue4 (talk | contribs) (→What is the SCAT) |
MB netblue4 (talk | contribs) (→Process integrity VS point in time) |
||
Line 28: | Line 28: | ||
==Process integrity VS point in time== | ==Process integrity VS point in time== | ||
+ | |||
+ | <p> | ||
+ | <strong>Process integrity</strong> | ||
+ | </p> | ||
+ | <p> | ||
+ | Answers the questions: When a vulnerability is detected | ||
+ | </p> | ||
+ | <ul> | ||
+ | |||
+ | <li>Do developers <span style="text-decoration:underline;">consistently</span> uses and approved fixes? | ||
+ | |||
+ | <li>Do testers <span style="text-decoration:underline;">consistently</span> write valid test? | ||
+ | |||
+ | <li>Can dev teams <span style="text-decoration:underline;">consistently</span> produce evidence they have done it securely? | ||
+ | </li> | ||
+ | </ul> | ||
+ | <p> | ||
+ | <span style="text-decoration:underline;">Consistency is important</span>: It means that when a vulnerability is detected it is fixed and <span style="text-decoration:underline;">will not reoccur</span> in the next sprint or when a new developer joins the team. Only when consistency is in place can organisations begin improving and <span style="text-decoration:underline;">maturing the process</span> | ||
+ | </p> | ||
+ | <p> | ||
+ | Process integrity tools<strong> </strong> | ||
+ | </p> | ||
+ | <ul> | ||
+ | |||
+ | <li>Vulnerability fixes are translated into security controls and built into the process of developing software. These are verified and each phase and evidence collected proving they was implemented correctly | ||
+ | |||
+ | <li>What do we mean by “translated into security controls”?: Detected vulnerabilities are enriched with organisational specifice secure code blocks, trained, verified, evidence collected and monitored for compliance. Translating vulnerabilities into security controls has a <span style="text-decoration:underline;">higher upfront setup cost</span> | ||
+ | </li> | ||
+ | </ul> | ||
+ | <p> | ||
+ | <strong>Point in time security verification</strong> | ||
+ | </p> | ||
+ | <p> | ||
+ | Answers the question: How many vulnerabilities do we have in production at this moment in time? | ||
+ | </p> | ||
+ | <p> | ||
+ | Point in time tools | ||
+ | </p> | ||
+ | <ul> | ||
+ | |||
+ | <li>Very good at periodically checking if vulnerabilities have been fixed with a low upfront setup cost | ||
+ | |||
+ | <li>Clearly instructs as to what needs to be fixed, but gives little guidance on <span style="text-decoration:underline;">how to</span> fix vulnerabilities | ||
+ | |||
+ | <li>Without guidance and only periodic checking, dev teams <span style="text-decoration:underline;">learn to fix vulnerabilities through trial and error</span> and rely on individual knowledge and experience | ||
+ | |||
Revision as of 08:15, 7 October 2019
What is the Secure code assurance tool (SCAT) |