This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Secure Software Development Lifecycle Project"
From OWASP
(Tag: Visual edit) |
(Tag: Visual edit) |
||
Line 58: | Line 58: | ||
• Release/maintenance Phase: Vulnerability Management and Incident Response Guideline | • Release/maintenance Phase: Vulnerability Management and Incident Response Guideline | ||
− | Detail information is in below table: | + | Detail information is in below table of content: |
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 346: | Line 346: | ||
− | |||
− | + | {| class="wikitable sortable" | |
+ | !Sub-Project Name | ||
+ | !Purpose | ||
+ | !RoadMap | ||
+ | !Sub-Porject Owner and Participant | ||
+ | !Output and Delivery | ||
+ | !Ref | ||
+ | |- | ||
+ | |OWASP S-SDLC Project | ||
+ | |OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle. | ||
+ | |2017Q3 | ||
+ | |Project Owner: | ||
+ | |||
+ | RIP | ||
+ | |||
+ | Lingzhi Gu | ||
+ | |||
+ | Yuezhong Bao | ||
+ | |||
+ | Tianze Xia | ||
+ | |||
+ | Project Manager: | ||
+ | |||
+ | XuFei | ||
+ | |OWASP S-SDLC Project Introduction Doc and Slides | ||
+ | | | ||
+ | |- | ||
+ | |OWASP S-SDLC Overall Flow | ||
+ | |This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption. | ||
+ | |2017Q2-Q4 | ||
+ | |Lingzhi Gu | ||
+ | |||
+ | Peter Xiao | ||
+ | |Best Practices of S-SDLC in Enterprises | ||
+ | | | ||
+ | |- | ||
+ | |OWASP S-SDLC Security Awareness Training Guide | ||
+ | |This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers. | ||
+ | |2017Q2-Q4 | ||
+ | |Jie Wang | ||
+ | |(1)Training slides | ||
+ | (2)Training Videos | ||
+ | |||
+ | (3)Examples of examination questions | ||
+ | |(1)OWASP TOP 10 | ||
+ | (2)OWASP MOBILE TOP 10 | ||
− | + | (3)OWASP IoT TOP 10 | |
+ | |- | ||
+ | |OWASP S-SDLC Security Requirement | ||
+ | |This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or general security requirements (eg, compliance requirements). | ||
+ | |2017Q2-Q4 | ||
+ | |Silver Zhang | ||
+ | |(1)Best Practices of S-SDLC Security Requirement | ||
− | + | (2)Security Requirement Checklist | |
+ | |OWASP Cheat Sheet Series | ||
+ | |- | ||
+ | |OWASP S-SDLC Security Design | ||
+ | |This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control. | ||
+ | |2017Q2-Q4 | ||
+ | |Lance Li | ||
+ | |(1)Best Practices of S-SDLC Security Design | ||
− | + | (2)Benchmark of OWASP security baseline | |
− | + | (3)Threat Modeling Guide | |
− | + | (4)Security Guideline for Common Components | |
+ | |(1)Application Threat Modeling | ||
+ | |||
+ | (2)OWASP ESAPI | ||
+ | |- | ||
+ | |OWASP S-SDLC Security Implementation | ||
+ | |The goal of this sub-project of OWASP S-SDLC are to: | ||
+ | |||
+ | (1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design | ||
+ | |||
+ | (2) Let implementation teams identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices. | ||
+ | |2017Q2-Q4 | ||
+ | | | ||
+ | Kan Yu | ||
+ | |||
+ | Ricky | ||
+ | |||
+ | |(1)Best Practices of S-SDLC Security Implementation | ||
+ | |||
+ | (2)Security Sriteria Checking Tool Sets for Coding | ||
+ | |||
+ | (3)Guideline for OWASP Code Review | ||
+ | |(1)OWASP Code Review Guide Project | ||
+ | |||
+ | (2)OWASP Cheat Sheet Series | ||
+ | |- | ||
+ | |OWASP S-SDLC Security Test | ||
+ | |Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended | ||
+ | |||
+ | Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements. | ||
+ | |||
+ | This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference. | ||
+ | |||
+ | |2017Q2-Q4 | ||
+ | |Tianze Xia | ||
+ | |(1)Best Practice of S-SDLC security testing | ||
+ | |||
+ | (2)Best Practice of OWASP Cheat sheet | ||
+ | |||
+ | (3) Best Practice of OWASP ASVS | ||
+ | |(1)OWASP testing Guide | ||
+ | |||
+ | (2)OWASP Cheat sheet | ||
+ | |||
+ | (3)OWASP Application Security Verification Standard Project (ASVS) | ||
+ | |||
+ | |- | ||
+ | |OWASP S-SDLC Security Deployment & SecDevOps | ||
+ | |In this phase of the S-SDLC focus on security auditing before deployment and security monitoring. The sub-project will research on | ||
+ | |||
+ | (1) develop a appropriate security baseline for deployment and devops | ||
+ | |||
+ | (2) the process of incident response and related tech. | ||
+ | |||
+ | (3)SecDevOps | ||
+ | |2017Q2-Q4 | ||
+ | |RIP | ||
+ | |(1)Best Practice of S-SDLC security Deployment | ||
+ | |||
+ | (2)Best Practice of S-SDLC SecDevOps | ||
+ | |||
+ | (3)Security Baseline for deployment and devops | ||
+ | |OWASP AppSensor | ||
+ | |} | ||