Skip to content

Commit 145f31f

Browse files
committed
Fix newlines
1 parent 04c1f67 commit 145f31f

2 files changed

Lines changed: 14 additions & 10 deletions

File tree

data/CultureandOrg.yml

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Education and Guidance:
2121
level: 2
2222
samm: EG2-B
2323
Regular security training for everyone:
24-
risk: Understanding security is hard, for internal as well as external employees.
24+
risk: "Understanding security is hard, for internal as well as external employees."
2525
measure: Regular security training for everyone.
2626
difficultyOfImplementation:
2727
knowledge: 3
@@ -30,7 +30,8 @@ Education and Guidance:
3030
usefulness: 3
3131
level: 3
3232
samm: EG2-B
33-
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour. Each team has a security champion:
33+
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour.
34+
Each team has a security champion:
3435
risk: No one feels directly responsible for security and the security champion does not have enough time to allocate to each team.
3536
measure: Each team defines an individual to be responsible for security. These individuals are often referred to as 'security champions'
3637
difficultyOfImplementation:
@@ -154,9 +155,10 @@ Culture and Org.:
154155
usefulness: 4
155156
level: 4
156157
dependsOn:
157-
- Creation of simple abuse stories
158+
- "Creation of simple abuse stories"
158159
samm: TA2-A
159-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Creation of simple abuse stories:
160+
implementation: "<a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a>"
161+
Creation of simple abuse stories:
160162
risk: User stories mostly don't consider security implications. Security flaws are discovered too late in the development and deployment process.
161163
measure: Abuse stories are created during the creation of user stories.
162164
difficultyOfImplementation:
@@ -166,7 +168,8 @@ Culture and Org.:
166168
usefulness: 4
167169
level: 2
168170
samm: TA2-A
169-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Information security targets are communicated:
171+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a>
172+
Information security targets are communicated:
170173
risk: Employees don't known their organisation security targets. Therefore security is not considered during development and administration as much as it should be.
171174
measure: Transparent and timely communication of the security targets by senior management is essential to ensure teams' buy-in and support.
172175
difficultyOfImplementation:

data/TestandVerification.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ Consolidation:
294294
implementation:
295295
- OWASP Defect Dojo
296296
- SecureCodeBox
297-
samm2: i-defect-management|B|1
297+
samm2: defect-management|B|1
298298
Definition of quality gates:
299299
risk: Improper examination of vulnerabilities leads to no visibility at all.
300300
measure: Quality gates for found vulnerabilities are defined. In the start it is important to not overload the security analyst, therefore the recommendation is to start with alerting of high cirital vulnerabilities.
@@ -304,9 +304,10 @@ Consolidation:
304304
resources: 1
305305
usefulness: 4
306306
level: 1
307-
samm: IR2-A
308-
samm2: i-defect-management|A|2
309-
implementation: "See other actions, e.g. \"Treatment of defects with severity high\"." Integration of vulnerability issues into the development process:
307+
samm: "IR2-A"
308+
samm2: "i-defect-management|A|2"
309+
implementation: "See other actions, e.g. \"Treatment of defects with severity high\"."
310+
Integration of vulnerability issues into the development process:
310311
risk: To read console output of the build server to search for vulnerabilities might be difficult. Also, to check a vulnerability management system might not be a daily task for a developer.
311312
measure: Vulnerabilities are tracked in the teams issue system (e.g. jira).
312313
difficultyOfImplementation:
@@ -315,7 +316,7 @@ Consolidation:
315316
resources: 1
316317
usefulness: 2
317318
level: 3
318-
implementation: At SAST (Static Application Security Testing): Server-side / client-side teams can easily be recorded. With microservice architecture, individual microservices can be used usually Teams. At DAST (Dynamic Application Security Testing): vulnerabilities are classified and can be assigned to server-side and client-side teams.
319+
implementation: "At SAST (Static Application Security Testing): Server-side / client-side teams can easily be recorded. With microservice architecture, individual microservices can be used usually Teams. At DAST (Dynamic Application Security Testing): vulnerabilities are classified and can be assigned to server-side and client-side teams."
319320
samm2: "i-defect-management|B|2"
320321
Reproducible defect tickets:
321322
risk: Vulnerability descriptions are hard to understand by staff from operations and development.

0 commit comments

Comments
 (0)