This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:Software Assurance Maturity Model"

From OWASP
Jump to: navigation, search
m (Reverted edits by Frank Alexander (talk) to last revision by Pravir Chandra)
Line 1: Line 1:
== Modelo de Auditoría de sistemas:  ==
+
{{OpenSAMM-NoCat}}
  
Éste es un modelo universal para securizar en un alto grado de seguridad al sistema operativo.  
+
==== Main ====
 +
<div style="display:inline;
 +
width:220px; float:right; padding-left:40px; padding-bottom:40px;">
 +
<div style="padding-bottom:10px;">
 +
[http://www.opensamm.org/download/ http://www.opensamm.org/downloads/DownloadButton.png]
 +
</div>
 +
<div style="padding-top:10px;">
 +
[http://www.opensamm.org/ Visit the SAMM Website]
 +
[http://www.opensamm.org/ http://www.owasp.org/images/4/44/SAMM-1.0-Cover.png]
 +
</div>
 +
</div>
  
#Sistema de cifrado congelado: Mantiene en secreto la ubicación del archivo del sistema, previniendo ataques de tipo monitoreo de redes.
+
The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in:
#OpenVAS: Línea de comandos para cifrar- descifrar el protocolo TCP/Ip
+
* '''Evaluating an organization’s existing software security practices'''
#Filtro Web: Previene intrusiones a través de puertos inseguros
+
* '''Building a balanced software security assurance program in well-defined iterations'''
#Clam Antivirus: Previene, detecta y corrige virus informático
+
* '''Demonstrating concrete improvements to a security assurance program'''
 +
* '''Defining and measuring security-related activities throughout an organization'''
  
<br>
+
SAMM was defined with flexibility in mind such that it can be utilized by small, medium, and large organizations using any style of development. Additionally, this model can be applied organization-wide, for a single line-of-business, or even for an individual project. Beyond these traits, SAMM was built on the following principles:
 +
* ''An organization’s behavior changes slowly over time'' - A successful software security program should be specified in small iterations that deliver tangible assurance gains while incrementally working toward long-term goals.
 +
* ''There is no single recipe that works for all organizations'' - A software security framework must be flexible and allow organizations to tailor their choices based on their risk tolerance and the way in which they build and use software.
 +
* ''Guidance related to security activities must be prescriptive'' - All the steps in building and assessing an assurance program should be simple, well-defined, and measurable. This model also provides roadmap templates for common types of organizations.
  
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
The foundation of the model is built upon the core business functions of software development with security practices tied to each (see diagram below). The building blocks of the model are the three maturity levels defined for each of the twelve security practices. These define a wide variety of activities in which an organization could engage to reduce security risks and increase software assurance. Additional details are included to measure successful activity performance, understand the associated assurance benefits, estimate personnel and other costs.
 +
 
 +
[[Image:SAMM-Overview.png|720px]]
 +
 
 +
 
 +
==== Browse Online ====
 +
===== Click on any badge to learn more =====
 +
 
 +
{| cellpadding="1"
 +
|[http://www.owasp.org/index.php/SAMM_-_Governance http://www.opensamm.org/badges/small/G.png]
 +
|-
 +
|align="center"|'''Strategy & Metrics'''
 +
|{{SAMM-BadgeList|name=Strategy_&_Metrics|abbr=SM|padding=0}}
 +
|-
 +
|align="center"|'''Policy & Compliance'''
 +
|{{SAMM-BadgeList|name=Policy_&_Compliance|abbr=PC|padding=0}}
 +
|-
 +
|align="center"|'''Education & Guidance'''
 +
|{{SAMM-BadgeList|name=Education_&_Guidance|abbr=EG|padding=0}}
 +
|-
 +
|[http://www.owasp.org/index.php/SAMM_-_Construction http://www.opensamm.org/badges/small/C.png]
 +
|-
 +
|align="center"|'''Threat Assessment'''
 +
|{{SAMM-BadgeList|name=Threat_Assessment|abbr=TA|padding=0}}
 +
|-
 +
|align="center"|'''Security Requirements'''
 +
|{{SAMM-BadgeList|name=Security_Requirements|abbr=SR|padding=0}}
 +
|-
 +
|align="center"|'''Secure Architecture'''
 +
|{{SAMM-BadgeList|name=Secure_Architecture|abbr=SA|padding=0}}
 +
|-
 +
|[http://www.owasp.org/index.php/SAMM_-_Verification http://www.opensamm.org/badges/small/V.png]
 +
|-
 +
|align="center"|'''Design Review'''
 +
|{{SAMM-BadgeList|name=Design_Review|abbr=DR|padding=0}}
 +
|-
 +
|align="center"|'''Code Review'''
 +
|{{SAMM-BadgeList|name=Code_Review|abbr=CR|padding=0}}
 +
|-
 +
|align="center"|'''Security Testing'''
 +
|{{SAMM-BadgeList|name=Security_Testing|abbr=ST|padding=0}}
 +
|-
 +
|[http://www.owasp.org/index.php/SAMM_-_Deployment http://www.opensamm.org/badges/small/D.png]
 
|-
 
|-
| Clam Antivirus
+
|align="center"|'''Vulnerability Management'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Vulnerability_Management|abbr=VM|padding=0}}
 
|-
 
|-
| Filtro Web
+
|align="center"|'''Environment Hardening'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Environment_Hardening|abbr=EH|padding=0}}
 
|-
 
|-
| OpenVAS
+
|align="center"|'''Operational Enablement'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Operational_Enablement|abbr=OE|padding=0}}
 
|-
 
|-
| Sistema de Cifrado Congelado
 
|}
 
 
|}
 
 
|}
 
 
 
|}
 
|}
  
== Descripción softwares de auditoría  ==
 
 
*El sistema de cifrado http://truecrypt.org cifra el núcleo del sistema operativo y los discos lógicos impidiendo ataques espía.
 
 
*Los comandos shell http://openvas.org sirven para analizar protocolos de red, detección de virus y cifrado del protocolo IpV4-6
 
 
*El filtro web http://freenetproject.org es una técnica que reemplaza al Firewall, discriminando puertos inseguros, ahorrando tiempo de procesamiento en el núcleo del sistema.
 
 
*Clamwin.com es un software de código abierto, no usa computación en la nube y tiene una GUI que detecta virus en línea http://sourceforge.net/projects/clamsentinel
 
 
== Macroinformática  ==
 
 
La macroinformática comprende eficiencia, seguridad y naturaleza. La eficacia de un sistema operativo se mide por la interacción hombre-máquina, sintetizando aplicaciones minimalistas y ejecutándolas nuestro sistema operativo procesará los datos eficientemente, ejemplos:
 
 
*Transmisión cifrada: Cliente e-mail con GnuPG
 
 
http://fellowship.fsfe.org
 
 
*Sistema de cifrado: Cifra y descifra texto plano, imágenes, etc..
 
 
#ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.11.exe
 
#http://cryptophane.googlecode.com/files/cryptophane-0.7.0.exe
 
 
*Ruby: Lenguaje de programación experimental
 
 
http://ruby-lang.org
 
 
*J2re1.3.1_20: Ejecutable de objetos interactivos o applets
 
 
http://java.sun.com/products/archive/j2se/1.3.1_20/index.html
 
 
*Escritorio: Gestor de ventanas X11
 
 
http://windowmaker.info
 
 
*Gnuzilla: Navegador seguro y de uso libre
 
 
http://code.google.com/p/iceweaselwindows/downloads/list
 
 
*Gnupdf: Visor de formato de texto universal pdf
 
 
http://blog.kowalczyk.info/software/sumatrapdf
 
 
*Gnuflash: Jugador alternativo a flash player
 
 
http://gnu.org/software/gnash
 
 
*Zinf: Reproductor de audio
 
 
http://zinf.org
 
 
*Informática forense: Análisis de datos ocultos en el disco duro
 
 
http://sleuthkit.org
 
 
*Compresor: Comprime datos sobreescribiendo bytes repetidos
 
 
http://peazip.sourceforge.net
 
 
*Ftp: Gestor de descarga de archivos
 
 
http://dfast.sourceforge.net
 
 
*AntiKeylogger: Neutraliza el seguimiento de escritorios remotos (Monitoring)
 
 
http://psmantikeyloger.sourceforge.net
 
 
*Password manager: Gestión de contraseñas
 
 
http://passwordsafe.sourceforge.net
 
 
*Limpiador de disco: Borra archivos innecesrios del sistema
 
 
http://bleachbit.sourceforge.net
 
 
*Desfragmentador: Reordena los archivos del disco duro, generando espacio virtual
 
 
http://kessels.com/jkdefrag
 
 
*X11: Gestor de ventanas, reemplazo de escritorio Xwindow's
 
 
http://bb4win.org
 
 
*Open Hardware: Hardware construído por la comunidad Linux
 
 
http://open-pc.com
 
 
*Open WRT: Firmware libre para configurar transmisión de Internet
 
 
http://openwrt.org
 
 
*Gnu- Linux: Sistema operativo universal
 
 
http://gnewsense.org
 
 
== Biocriptoseguridad ==: Es la unión de la biología, criptografía y hacking ético para formar una defensa stándar contra virus complejos.
 
 
Implementación de la biocriptoseguridad informática:
 
 
#Amplificar la banda ancha
 
#Optimizar (limpiar- modificar) el sistema operativo
 
#Desfragmentar los discos lógicos
 
#Ocultar el sistema operativo
 
#Configurar antivirus
 
#Limpiar y desfragmentar
 
#Congelar
 
 
*Sistema inmune._ Defensa biológica natural contra infecciones como virus http://immunet.com
 
 
*Criptografía._ Método de escritura oculta por caractes, números y letras:—{H}/gJa¢K¡Ng÷752%\*)A>¡#(W|a— http://diskcryptor.net
 
 
*Hacking ético._ Auditoría de sistemas informáticos que preserva la integridad de los datos.
 
 
Congelador: Mantiene el equilibrio en la integridad de los datos, el sistema operativo, red , memoria ram, ciclos de CPU, espacio en disco duro e incidencias de malware
 
 
*http://code.google.com/p/hzr312001/downloads/detail?name=Deep%20systemze%20Standard%20Version%206.51.020.2725.rar&amp;can=2&amp;q= (para Window's)
 
*http://sourceforge.net/projects/lethe (para GNU/Linux)
 
 
<br>Auditoría de virus cifrado._ Un criptovirus se oculta tras un algoritmo de criptografía, generalmente es híbrido simétrico-asimétrico con una extensión de 1700bit's, burla los escáneres antivirus con la aleatoriedad de cifrado, facilitando la expansión de las botnet's. La solución es crear un sistema operativo transparente, anonimizarlo y usar herramientas de cifrado stándar de uso libre:
 
 
*Gnupg: Sirve para cifrar mensajes de correo electrónico http://gpg4win.org/download.html
 
 
*Open Secure Shell: Ofuscador TcpIp, protege el túnel de comunicación digital cifrando la Ip. http://openvas.org
 
  
*Red protegida: DNS libre http://namespace.org/switch
+
==== Project Identification ====
 +
{{:Key Project Information:Software Assurance Maturity Model Project}}
  
*Criptosistema simétrico: Encapsula el disco duro, incluyendo el sistema operativo,usando algoritmo Twofish http://truecrypt.org/downloads.php
+
[[Category:OWASP Project]]
 +
[[Category:OWASP Document]]
 +
[[Category:OWASP Alpha Quality Document]]
  
*Proxy cifrado: Autenticación de usuario anónimo http://torproject.org
 
  
Energías renovables._ Son energías adquiridas por medios naturales: hidrógeno, aire, sol que disminuyen la toxicidad de las emisiones de Co2 en el medio ambiente, impulsando políticas ecologistas contribuímos a preservar el ecosistema. Ejm: Usando paneles solares fotovoltaicos.
+
__NOTOC__
 +
<headertabs/>
 +
<br/>{{OWASP Book|6888083}}<br/>

Revision as of 23:05, 7 February 2011

250px-OpenSAMM_logo.png For the latest project news and information,
join the mailing list and visit the OpenSAMM website.


Main

DownloadButton.png

Visit the SAMM Website SAMM-1.0-Cover.png

The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in:

  • Evaluating an organization’s existing software security practices
  • Building a balanced software security assurance program in well-defined iterations
  • Demonstrating concrete improvements to a security assurance program
  • Defining and measuring security-related activities throughout an organization

SAMM was defined with flexibility in mind such that it can be utilized by small, medium, and large organizations using any style of development. Additionally, this model can be applied organization-wide, for a single line-of-business, or even for an individual project. Beyond these traits, SAMM was built on the following principles:

  • An organization’s behavior changes slowly over time - A successful software security program should be specified in small iterations that deliver tangible assurance gains while incrementally working toward long-term goals.
  • There is no single recipe that works for all organizations - A software security framework must be flexible and allow organizations to tailor their choices based on their risk tolerance and the way in which they build and use software.
  • Guidance related to security activities must be prescriptive - All the steps in building and assessing an assurance program should be simple, well-defined, and measurable. This model also provides roadmap templates for common types of organizations.

The foundation of the model is built upon the core business functions of software development with security practices tied to each (see diagram below). The building blocks of the model are the three maturity levels defined for each of the twelve security practices. These define a wide variety of activities in which an organization could engage to reduce security risks and increase software assurance. Additional details are included to measure successful activity performance, understand the associated assurance benefits, estimate personnel and other costs.

SAMM-Overview.png


Browse Online

Click on any badge to learn more
G.png
Strategy & Metrics
SM1.png SM2.png SM3.png
Policy & Compliance
PC1.png PC2.png PC3.png
Education & Guidance
EG1.png EG2.png EG3.png
C.png
Threat Assessment
TA1.png TA2.png TA3.png
Security Requirements
SR1.png SR2.png SR3.png
Secure Architecture
SA1.png SA2.png SA3.png
V.png
Design Review
DR1.png DR2.png DR3.png
Code Review
CR1.png CR2.png CR3.png
Security Testing
ST1.png ST2.png ST3.png
D.png
Vulnerability Management
VM1.png VM2.png VM3.png
Environment Hardening
EH1.png EH2.png EH3.png
Operational Enablement
OE1.png OE2.png OE3.png


Project Identification


PROJECT INFORMATION
Project Name Software Assurance Maturity Model (SAMM) Project
Short Project Description

The Software Assurance Maturity Model (SAMM) project is committed to building a usable framework to help organizations formulate and implement a strategy for application security that's tailored to the specific business risks facing the organization. The goal is to create well-defined and measurable goals that can be used by small, medium,and large sized organizations in any line of business that involves software development.
In 2013 SAMM will be improved, see the announcement on the mailing list here.

Key Project Information

Project Leader
Seba Deleersnyder
Project Co-leaders
Pravir Chandra
Kuai Hinojosa
Bart De Win

Project Contibutors
See here

Mailing List
Subscribe here
Use here

License
Creative Commons Attribution Share Alike 3.0

Project Type
Documentation

Sponsors
Fortify
Cognosticus

Release Status Main Links Related Projects

Alpha Quality
Please see here for complete information.




OWASP Books logo.png This project has produced a book that can be downloaded or purchased.
Feel free to browse the full catalog of available OWASP books.

Pages in category "Software Assurance Maturity Model"

The following 47 pages are in this category, out of 47 total.

Media in category "Software Assurance Maturity Model"

The following 3 files are in this category, out of 3 total.