You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/CultureandOrg.yml
+35-64Lines changed: 35 additions & 64 deletions
Original file line number
Diff line number
Diff line change
@@ -10,32 +10,29 @@ Education and Guidance:
10
10
usefulness: 3
11
11
level: 1
12
12
samm: EG2-B
13
-
Regulary security training of security champions:
13
+
Regular security training of security champions:
14
14
risk: Understanding security is hard, even for security champions.
15
-
measure: Regulary security training of security champions.
15
+
measure: Regular security training of security champions.
16
16
difficultyOfImplementation:
17
17
knowledge: 3
18
18
time: 2
19
19
resources: 2
20
20
usefulness: 3
21
21
level: 2
22
22
samm: EG2-B
23
-
Regulary security training for everyone:
24
-
risk: Understanding security is hard, for interal as well as external employees.
25
-
measure: Regulary security training for everyone.
23
+
Regular security training for everyone:
24
+
risk: Understanding security is hard, for internal as well as external employees.
25
+
measure: Regular security training for everyone.
26
26
difficultyOfImplementation:
27
27
knowledge: 3
28
28
time: 2
29
29
resources: 2
30
30
usefulness: 3
31
31
level: 3
32
32
samm: EG2-B
33
-
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employyes. It is conducted every two weeks for around one hour.
34
-
Each team has a security champion:
35
-
risk: No one feels directly responsible for security and the securiy champion does not have enough
36
-
time to allocate to each team.
37
-
measure: Each team defines an individual to be responsible for security. These individuals are often
38
-
referred to as 'security champions'
33
+
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour. Each team has a security champion:
34
+
risk: No one feels directly responsible for security and the security champion does not have enough time to allocate to each team.
35
+
measure: Each team defines an individual to be responsible for security. These individuals are often referred to as 'security champions'
risk: After an incident, a simular incident might reoccur.
49
-
measure: Running a 'lessons learned' ession after an incident helps drive continuous improvement.
50
-
Regular meetings with security shampions are a good place to share and discuss lessons learned.
45
+
risk: After an incident, a similar incident might reoccur.
46
+
measure: Running a 'lessons learned' session after an incident helps drive continuous improvement. Regular meetings with security champions are a good place to share and discuss lessons learned.
51
47
difficultyOfImplementation:
52
48
knowledge: 3
53
49
time: 3
54
50
resources: 1
55
51
usefulness: 3
56
52
level: 3
57
53
samm: IM-3, ST-3, SR2-B
58
-
Conduction of collaborative security checks with develoeprs and system administrators:
59
-
risk: Security checks by external companies do not increase the understanding of
60
-
an application/system for internal employees.
61
-
measure: Periodically security reviews of source code (SCA), in which security
62
-
SME, developers and operatins are envolved, are effectve at increasing
63
-
the robusteness of software and the security knowledge of the teams involved.
54
+
Conduction of collaborative security checks with developers and system administrators:
55
+
risk: Security checks by external companies do not increase the understanding of an application/system for internal employees.
56
+
measure: Periodically security reviews of source code (SCA), in which security SME, developers and operations are involved, are effective at increasing the robustness of software and the security knowledge of the teams involved.
64
57
difficultyOfImplementation:
65
58
knowledge: 3
66
59
time: 2
@@ -69,9 +62,8 @@ Education and Guidance:
69
62
level: 3
70
63
samm: IR1-B
71
64
Conduction of collaborative team security checks:
72
-
risk: Developement teams hlimited insight over security practices.
73
-
measure: Mutual security testing the security of other teams's project enhances
74
-
security awareness and knowledge.
65
+
risk: Development teams limited insight over security practices.
66
+
measure: Mutual security testing the security of other teams's project enhances security awareness and knowledge.
75
67
difficultyOfImplementation:
76
68
resources: 2
77
69
knowledge: 4
@@ -91,8 +83,7 @@ Education and Guidance:
91
83
implementation: https://builditbreakit.org/
92
84
Conduction of war games:
93
85
risk: Understanding incident response plans during an incident is hard and ineffective.
94
-
measure: War Games like activities help train for incidents. Security SMEs create attack scenarios
95
-
in a testing environment enabling the rainees to learn how to react in case of an incident.
86
+
measure: War Games like activities help train for incidents. Security SMEs create attack scenarios in a testing environment enabling the trainees to learn how to react in case of an incident.
96
87
difficultyOfImplementation:
97
88
knowledge: 4
98
89
time: 5
@@ -108,14 +99,12 @@ Education and Guidance:
108
99
resources: 1
109
100
usefulness: 3
110
101
level: 2
111
-
implementation: One example is the distributon of buttons as a reward, see <a
102
+
implementation: One example is the distribution of buttons as a reward, see <a
risk: The concept of Security Champions might suggest that only he/she is repsonsible
116
-
for security. However, everyone in the project team should be responsible for security.
117
-
measure: By aligning security SME with project teams, a higher security
118
-
standard can be achieved.
106
+
risk: The concept of Security Champions might suggest that only he/she is responsible for security. However, everyone in the project team should be responsible for security.
107
+
measure: By aligning security SME with project teams, a higher security standard can be achieved.
119
108
difficultyOfImplementation:
120
109
knowledge: 4
121
110
time: 5
@@ -127,7 +116,7 @@ Education and Guidance:
127
116
Culture and Org.:
128
117
Conduction of advanced threat modelling:
129
118
risk: Inadequate identification of business and technical risks.
130
-
measure: Threat modelling is performed by using reviewing user stories and producing security driven data flow diagramms.
119
+
measure: Threat modelling is performed by using reviewing user stories and producing security driven data flow diagrams.
131
120
difficultyOfImplementation:
132
121
knowledge: 4
133
122
time: 3
@@ -136,10 +125,8 @@ Culture and Org.:
136
125
level: 4
137
126
samm: TA2-B
138
127
Conduction of simple threat modelling on business level:
139
-
risk: Business related threats are discovered too late in the development and
140
-
deployment process.
141
-
measure: Threat modelling of business functionality is performed during the product backlog
142
-
creation to facilitate early detection of security defects.
128
+
risk: Business related threats are discovered too late in the development and deployment process.
129
+
measure: Threat modelling of business functionality is performed during the product backlog creation to facilitate early detection of security defects.
143
130
difficultyOfImplementation:
144
131
knowledge: 2
145
132
time: 3
@@ -148,10 +135,8 @@ Culture and Org.:
148
135
level: 3
149
136
samm: TA1-A
150
137
Conduction of simple threat modelling on technical level:
151
-
risk: Technical related threats are discovered too late in the development and
152
-
deployment process.
153
-
measure: Threat modelling of technical features is performed during the product sprint
154
-
planning.
138
+
risk: Technical related threats are discovered too late in the development and deployment process.
139
+
measure: Threat modelling of technical features is performed during the product sprint planning.
155
140
difficultyOfImplementation:
156
141
knowledge: 2
157
142
time: 3
@@ -160,9 +145,7 @@ Culture and Org.:
160
145
level: 3
161
146
samm: TA1-A
162
147
Creation of advanced abuse stories:
163
-
risk: Simple user stories are not going deep enough. Relevant security considerations
164
-
are performed. Security flaws are discovered too late in the development and
165
-
deployment process
148
+
risk: Simple user stories are not going deep enough. Relevant security considerations are performed. Security flaws are discovered too late in the development and deployment process
166
149
measure: Advanced abuse stories are created as part of threat modelling activities.
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
178
-
Security Stories and Security Tasks for Agile Development Environments</a>
179
-
Creation of simple abuse stories:
180
-
risk: User stories mostly don't consider security implications. Security flaws
181
-
are discovered too late in the development and deployment process.
159
+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Creation of simple abuse stories:
160
+
risk: User stories mostly don't consider security implications. Security flaws are discovered too late in the development and deployment process.
182
161
measure: Abuse stories are created during the creation of user stories.
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
192
-
Security Stories and Security Tasks for Agile Development Environments</a>
193
-
Information security targets are communicated:
194
-
risk: Employees don't known their organication security targets. Therefore
195
-
security is not considered during development and administration as much as
196
-
it should be.
197
-
measure: Transparent and timely communication of the security targets by senior
198
-
management is essential to ensure teams' buy-in and support.
169
+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Information security targets are communicated:
170
+
risk: Employees don't known their organisation security targets. Therefore security is not considered during development and administration as much as it should be.
171
+
measure: Transparent and timely communication of the security targets by senior management is essential to ensure teams' buy-in and support.
199
172
difficultyOfImplementation:
200
173
knowledge: 1
201
174
time: 1
@@ -205,17 +178,17 @@ Culture and Org.:
205
178
samm: SM1-B
206
179
Process:
207
180
# Data classification:
208
-
Definition of simple BCDR practices for citical components:
181
+
Definition of simple BCDR practices for critical components:
209
182
risk: In case of an emergency, like a power outage, DR actions to perform are not clear. This leads to reaction and remediation delays.
210
-
measure: By understanding and documenting a business continuity and disaster recovery (BCDR) plan, the overall availabilitiy of systems and applications is increased. Success factors like responsibilties, Service Level Agreemenmts, Recovery Point Objectives, Recovery Time Objectives or Failover must be fully documentate and understood.
183
+
measure: By understanding and documenting a business continuity and disaster recovery (BCDR) plan, the overall availability of systems and applications is increased. Success factors like responsibilities, Service Level Agreements, Recovery Point Objectives, Recovery Time Objectives or Failover must be fully documented and understood.
211
184
difficultyOfImplementation:
212
185
knowledge: 4
213
186
time: 3
214
187
resources: 2
215
188
usefulness: 4
216
189
level: 1
217
190
218
-
Definition of a change mangement process:
191
+
Definition of a change management process:
219
192
risk: The impact of a change is not controlled because these are not recorded or documented.
220
193
measure: Each change of a system is automatically recorded and adequately logged.
221
194
difficultyOfImplementation:
@@ -226,10 +199,8 @@ Process:
226
199
level: 3
227
200
228
201
Approval by reviewing any new version:
229
-
risk: An individual might forget to implement security measures to protect source code or infrastructure
230
-
components.
231
-
measure: On each new version (e.g. Pull Request) of source code or infrastructure
232
-
components a security peer review of the changes is performed (two eyes principle) and approval given by the reviewer.
202
+
risk: An individual might forget to implement security measures to protect source code or infrastructure components.
203
+
measure: On each new version (e.g. Pull Request) of source code or infrastructure components a security peer review of the changes is performed (two eyes principle) and approval given by the reviewer.
0 commit comments