This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Security Integration System"

From OWASP
Jump to: navigation, search
(What is the SCAT)
(Process integrity VS point in time)
Line 28: Line 28:
  
 
==Process integrity VS point in time==
 
==Process integrity VS point in time==
 +
 +
<p>
 +
<strong>Process integrity</strong>
 +
</p>
 +
<p>
 +
Answers the questions: When a vulnerability is detected
 +
</p>
 +
<ul>
 +
 +
<li>Do developers <span style="text-decoration:underline;">consistently</span> uses and approved fixes?
 +
 +
<li>Do testers <span style="text-decoration:underline;">consistently</span> write valid test?
 +
 +
<li>Can dev teams <span style="text-decoration:underline;">consistently</span> produce evidence they have done it securely?
 +
</li>
 +
</ul>
 +
<p>
 +
<span style="text-decoration:underline;">Consistency is important</span>: It means that when a vulnerability is detected it is fixed and <span style="text-decoration:underline;">will not reoccur</span> in the next sprint or when a new developer joins the team.  Only when consistency is in place can organisations begin improving and <span style="text-decoration:underline;">maturing the process</span>
 +
</p>
 +
<p>
 +
Process integrity tools<strong> </strong>
 +
</p>
 +
<ul>
 +
 +
<li>Vulnerability fixes are translated into security controls and built into the process of developing software.  These are verified and each phase  and evidence collected proving they was implemented correctly
 +
 +
<li>What do we mean by “translated into security controls”?: Detected vulnerabilities are enriched with organisational specifice secure code blocks, trained, verified, evidence collected and monitored for compliance.  Translating vulnerabilities into security controls has a  <span style="text-decoration:underline;">higher upfront setup cost</span>
 +
</li>
 +
</ul>
 +
<p>
 +
<strong>Point in time security verification</strong>
 +
</p>
 +
<p>
 +
Answers the question: How many vulnerabilities do we have in production at this moment in time? 
 +
</p>
 +
<p>
 +
Point in time tools
 +
</p>
 +
<ul>
 +
 +
<li>Very good at periodically checking if vulnerabilities have been fixed with a low upfront setup cost
 +
 +
<li>Clearly instructs as to what needs to be fixed, but gives little guidance on <span style="text-decoration:underline;">how to</span> fix vulnerabilities
 +
 +
<li>Without guidance and only periodic checking, dev teams <span style="text-decoration:underline;">learn to fix vulnerabilities through trial and error</span> and rely on individual knowledge and experience
 +
  
  

Revision as of 08:15, 7 October 2019

OWASP Project Header.jpg

What is the Secure code assurance tool (SCAT)

What is the SCAT

  • SCAT is a process integrity tool, implementing a consistent, authorized and auditable software development process
  • SCAT is used by development teams to build, verify and assure secure software
    • Build: uses a combination of code level guidance, on demand training and DAST tools to train, guide and verify correct implementation
    • Verify: uses a combination of manual test plans and SATS tools to guide and verify correct implementation
    • Assure: centrally stores and publishes evidence of secure development and testing as an audit trail. Providing traceability through requirements and proving that security controls operate efficiently over a period of time
  • SCAT is not a point in time security verification tool for detecting vulnerabilities after development

Process integrity VS point in time

Process integrity

Answers the questions: When a vulnerability is detected

  • Do developers consistently uses and approved fixes?
  • Do testers consistently write valid test?
  • Can dev teams consistently produce evidence they have done it securely?

Consistency is important: It means that when a vulnerability is detected it is fixed and will not reoccur in the next sprint or when a new developer joins the team. Only when consistency is in place can organisations begin improving and maturing the process

Process integrity tools

  • Vulnerability fixes are translated into security controls and built into the process of developing software. These are verified and each phase and evidence collected proving they was implemented correctly
  • What do we mean by “translated into security controls”?: Detected vulnerabilities are enriched with organisational specifice secure code blocks, trained, verified, evidence collected and monitored for compliance. Translating vulnerabilities into security controls has a higher upfront setup cost

Point in time security verification

Answers the question: How many vulnerabilities do we have in production at this moment in time?

Point in time tools

  • Very good at periodically checking if vulnerabilities have been fixed with a low upfront setup cost
  • Clearly instructs as to what needs to be fixed, but gives little guidance on how to fix vulnerabilities
  • Without guidance and only periodic checking, dev teams learn to fix vulnerabilities through trial and error and rely on individual knowledge and experience