You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/CultureandOrg.yml
+8-5Lines changed: 8 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Education and Guidance:
21
21
level: 2
22
22
samm: EG2-B
23
23
Regular security training for everyone:
24
-
risk: Understanding security is hard, for internal as well as external employees.
24
+
risk: "Understanding security is hard, for internal as well as external employees."
25
25
measure: Regular security training for everyone.
26
26
difficultyOfImplementation:
27
27
knowledge: 3
@@ -30,7 +30,8 @@ Education and Guidance:
30
30
usefulness: 3
31
31
level: 3
32
32
samm: EG2-B
33
-
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour. Each team has a security champion:
33
+
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour.
34
+
Each team has a security champion:
34
35
risk: No one feels directly responsible for security and the security champion does not have enough time to allocate to each team.
35
36
measure: Each team defines an individual to be responsible for security. These individuals are often referred to as 'security champions'
36
37
difficultyOfImplementation:
@@ -154,9 +155,10 @@ Culture and Org.:
154
155
usefulness: 4
155
156
level: 4
156
157
dependsOn:
157
-
- Creation of simple abuse stories
158
+
- "Creation of simple abuse stories"
158
159
samm: TA2-A
159
-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Creation of simple abuse stories:
160
+
implementation: "<a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a>"
161
+
Creation of simple abuse stories:
160
162
risk: User stories mostly don't consider security implications. Security flaws are discovered too late in the development and deployment process.
161
163
measure: Abuse stories are created during the creation of user stories.
162
164
difficultyOfImplementation:
@@ -166,7 +168,8 @@ Culture and Org.:
166
168
usefulness: 4
167
169
level: 2
168
170
samm: TA2-A
169
-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Information security targets are communicated:
171
+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a>
172
+
Information security targets are communicated:
170
173
risk: Employees don't known their organisation security targets. Therefore security is not considered during development and administration as much as it should be.
171
174
measure: Transparent and timely communication of the security targets by senior management is essential to ensure teams' buy-in and support.
Copy file name to clipboardExpand all lines: data/TestandVerification.yml
+6-5Lines changed: 6 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -294,7 +294,7 @@ Consolidation:
294
294
implementation:
295
295
- OWASP Defect Dojo
296
296
- SecureCodeBox
297
-
samm2: i-defect-management|B|1
297
+
samm2: defect-management|B|1
298
298
Definition of quality gates:
299
299
risk: Improper examination of vulnerabilities leads to no visibility at all.
300
300
measure: Quality gates for found vulnerabilities are defined. In the start it is important to not overload the security analyst, therefore the recommendation is to start with alerting of high cirital vulnerabilities.
@@ -304,9 +304,10 @@ Consolidation:
304
304
resources: 1
305
305
usefulness: 4
306
306
level: 1
307
-
samm: IR2-A
308
-
samm2: i-defect-management|A|2
309
-
implementation: "See other actions, e.g. \"Treatment of defects with severity high\"."Integration of vulnerability issues into the development process:
307
+
samm: "IR2-A"
308
+
samm2: "i-defect-management|A|2"
309
+
implementation: "See other actions, e.g. \"Treatment of defects with severity high\"."
310
+
Integration of vulnerability issues into the development process:
310
311
risk: To read console output of the build server to search for vulnerabilities might be difficult. Also, to check a vulnerability management system might not be a daily task for a developer.
311
312
measure: Vulnerabilities are tracked in the teams issue system (e.g. jira).
312
313
difficultyOfImplementation:
@@ -315,7 +316,7 @@ Consolidation:
315
316
resources: 1
316
317
usefulness: 2
317
318
level: 3
318
-
implementation: At SAST (Static Application Security Testing): Server-side / client-side teams can easily be recorded. With microservice architecture, individual microservices can be used usually Teams. At DAST (Dynamic Application Security Testing): vulnerabilities are classified and can be assigned to server-side and client-side teams.
319
+
implementation: "At SAST (Static Application Security Testing): Server-side / client-side teams can easily be recorded. With microservice architecture, individual microservices can be used usually Teams. At DAST (Dynamic Application Security Testing): vulnerabilities are classified and can be assigned to server-side and client-side teams."
319
320
samm2: "i-defect-management|B|2"
320
321
Reproducible defect tickets:
321
322
risk: Vulnerability descriptions are hard to understand by staff from operations and development.
0 commit comments