Skip to content

Commit da12798

Browse files
authored
Update CultureandOrg.yml
corrected typos and cleaned up formatting
1 parent f93f75d commit da12798

1 file changed

Lines changed: 35 additions & 64 deletions

File tree

data/CultureandOrg.yml

Lines changed: 35 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -10,32 +10,29 @@ Education and Guidance:
1010
usefulness: 3
1111
level: 1
1212
samm: EG2-B
13-
Regulary security training of security champions:
13+
Regular security training of security champions:
1414
risk: Understanding security is hard, even for security champions.
15-
measure: Regulary security training of security champions.
15+
measure: Regular security training of security champions.
1616
difficultyOfImplementation:
1717
knowledge: 3
1818
time: 2
1919
resources: 2
2020
usefulness: 3
2121
level: 2
2222
samm: EG2-B
23-
Regulary security training for everyone:
24-
risk: Understanding security is hard, for interal as well as external employees.
25-
measure: Regulary security training for everyone.
23+
Regular security training for everyone:
24+
risk: Understanding security is hard, for internal as well as external employees.
25+
measure: Regular security training for everyone.
2626
difficultyOfImplementation:
2727
knowledge: 3
2828
time: 2
2929
resources: 2
3030
usefulness: 3
3131
level: 3
3232
samm: EG2-B
33-
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employyes. It is conducted every two weeks for around one hour.
34-
Each team has a security champion:
35-
risk: No one feels directly responsible for security and the securiy champion does not have enough
36-
time to allocate to each team.
37-
measure: Each team defines an individual to be responsible for security. These individuals are often
38-
referred to as 'security champions'
33+
implementation: Often, external employees are not invited for interal trainings. This activity focuses on providing security trainings to internal as well as external employees. It is conducted every two weeks for around one hour. Each team has a security champion:
34+
risk: No one feels directly responsible for security and the security champion does not have enough time to allocate to each team.
35+
measure: Each team defines an individual to be responsible for security. These individuals are often referred to as 'security champions'
3936
difficultyOfImplementation:
4037
knowledge: 3
4138
time: 2
@@ -45,22 +42,18 @@ Education and Guidance:
4542
samm: EG2-B
4643
implementation: https://www.owasp.org/index.php/Security_Champions_Playbook
4744
Security-Lessoned-Learned:
48-
risk: After an incident, a simular incident might reoccur.
49-
measure: Running a 'lessons learned' ession after an incident helps drive continuous improvement.
50-
Regular meetings with security shampions are a good place to share and discuss lessons learned.
45+
risk: After an incident, a similar incident might reoccur.
46+
measure: Running a 'lessons learned' session after an incident helps drive continuous improvement. Regular meetings with security champions are a good place to share and discuss lessons learned.
5147
difficultyOfImplementation:
5248
knowledge: 3
5349
time: 3
5450
resources: 1
5551
usefulness: 3
5652
level: 3
5753
samm: IM-3, ST-3, SR2-B
58-
Conduction of collaborative security checks with develoeprs and system administrators:
59-
risk: Security checks by external companies do not increase the understanding of
60-
an application/system for internal employees.
61-
measure: Periodically security reviews of source code (SCA), in which security
62-
SME, developers and operatins are envolved, are effectve at increasing
63-
the robusteness of software and the security knowledge of the teams involved.
54+
Conduction of collaborative security checks with developers and system administrators:
55+
risk: Security checks by external companies do not increase the understanding of an application/system for internal employees.
56+
measure: Periodically security reviews of source code (SCA), in which security SME, developers and operations are involved, are effective at increasing the robustness of software and the security knowledge of the teams involved.
6457
difficultyOfImplementation:
6558
knowledge: 3
6659
time: 2
@@ -69,9 +62,8 @@ Education and Guidance:
6962
level: 3
7063
samm: IR1-B
7164
Conduction of collaborative team security checks:
72-
risk: Developement teams hlimited insight over security practices.
73-
measure: Mutual security testing the security of other teams's project enhances
74-
security awareness and knowledge.
65+
risk: Development teams limited insight over security practices.
66+
measure: Mutual security testing the security of other teams's project enhances security awareness and knowledge.
7567
difficultyOfImplementation:
7668
resources: 2
7769
knowledge: 4
@@ -91,8 +83,7 @@ Education and Guidance:
9183
implementation: https://builditbreakit.org/
9284
Conduction of war games:
9385
risk: Understanding incident response plans during an incident is hard and ineffective.
94-
measure: War Games like activities help train for incidents. Security SMEs create attack scenarios
95-
in a testing environment enabling the rainees to learn how to react in case of an incident.
86+
measure: War Games like activities help train for incidents. Security SMEs create attack scenarios in a testing environment enabling the trainees to learn how to react in case of an incident.
9687
difficultyOfImplementation:
9788
knowledge: 4
9889
time: 5
@@ -108,14 +99,12 @@ Education and Guidance:
10899
resources: 1
109100
usefulness: 3
110101
level: 2
111-
implementation: One example is the distributon of buttons as a reward, see <a
102+
implementation: One example is the distribution of buttons as a reward, see <a
112103
href='https://www.owasp.org/index.php/OWASP_Security_Buttons_Project'>OWASP
113104
Security Buttons Project</a>
114105
Aligning security in teams:
115-
risk: The concept of Security Champions might suggest that only he/she is repsonsible
116-
for security. However, everyone in the project team should be responsible for security.
117-
measure: By aligning security SME with project teams, a higher security
118-
standard can be achieved.
106+
risk: The concept of Security Champions might suggest that only he/she is responsible for security. However, everyone in the project team should be responsible for security.
107+
measure: By aligning security SME with project teams, a higher security standard can be achieved.
119108
difficultyOfImplementation:
120109
knowledge: 4
121110
time: 5
@@ -127,7 +116,7 @@ Education and Guidance:
127116
Culture and Org.:
128117
Conduction of advanced threat modelling:
129118
risk: Inadequate identification of business and technical risks.
130-
measure: Threat modelling is performed by using reviewing user stories and producing security driven data flow diagramms.
119+
measure: Threat modelling is performed by using reviewing user stories and producing security driven data flow diagrams.
131120
difficultyOfImplementation:
132121
knowledge: 4
133122
time: 3
@@ -136,10 +125,8 @@ Culture and Org.:
136125
level: 4
137126
samm: TA2-B
138127
Conduction of simple threat modelling on business level:
139-
risk: Business related threats are discovered too late in the development and
140-
deployment process.
141-
measure: Threat modelling of business functionality is performed during the product backlog
142-
creation to facilitate early detection of security defects.
128+
risk: Business related threats are discovered too late in the development and deployment process.
129+
measure: Threat modelling of business functionality is performed during the product backlog creation to facilitate early detection of security defects.
143130
difficultyOfImplementation:
144131
knowledge: 2
145132
time: 3
@@ -148,10 +135,8 @@ Culture and Org.:
148135
level: 3
149136
samm: TA1-A
150137
Conduction of simple threat modelling on technical level:
151-
risk: Technical related threats are discovered too late in the development and
152-
deployment process.
153-
measure: Threat modelling of technical features is performed during the product sprint
154-
planning.
138+
risk: Technical related threats are discovered too late in the development and deployment process.
139+
measure: Threat modelling of technical features is performed during the product sprint planning.
155140
difficultyOfImplementation:
156141
knowledge: 2
157142
time: 3
@@ -160,9 +145,7 @@ Culture and Org.:
160145
level: 3
161146
samm: TA1-A
162147
Creation of advanced abuse stories:
163-
risk: Simple user stories are not going deep enough. Relevant security considerations
164-
are performed. Security flaws are discovered too late in the development and
165-
deployment process
148+
risk: Simple user stories are not going deep enough. Relevant security considerations are performed. Security flaws are discovered too late in the development and deployment process
166149
measure: Advanced abuse stories are created as part of threat modelling activities.
167150
difficultyOfImplementation:
168151
knowledge: 4
@@ -173,12 +156,8 @@ Culture and Org.:
173156
dependsOn:
174157
- Creation of simple abuse stories
175158
samm: TA2-A
176-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
177-
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
178-
Security Stories and Security Tasks for Agile Development Environments</a>
179-
Creation of simple abuse stories:
180-
risk: User stories mostly don't consider security implications. Security flaws
181-
are discovered too late in the development and deployment process.
159+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Creation of simple abuse stories:
160+
risk: User stories mostly don't consider security implications. Security flaws are discovered too late in the development and deployment process.
182161
measure: Abuse stories are created during the creation of user stories.
183162
difficultyOfImplementation:
184163
knowledge: 2
@@ -187,15 +166,9 @@ Culture and Org.:
187166
usefulness: 4
188167
level: 2
189168
samm: TA2-A
190-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
191-
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
192-
Security Stories and Security Tasks for Agile Development Environments</a>
193-
Information security targets are communicated:
194-
risk: Employees don't known their organication security targets. Therefore
195-
security is not considered during development and administration as much as
196-
it should be.
197-
measure: Transparent and timely communication of the security targets by senior
198-
management is essential to ensure teams' buy-in and support.
169+
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical Security Stories and Security Tasks for Agile Development Environments</a> Information security targets are communicated:
170+
risk: Employees don't known their organisation security targets. Therefore security is not considered during development and administration as much as it should be.
171+
measure: Transparent and timely communication of the security targets by senior management is essential to ensure teams' buy-in and support.
199172
difficultyOfImplementation:
200173
knowledge: 1
201174
time: 1
@@ -205,17 +178,17 @@ Culture and Org.:
205178
samm: SM1-B
206179
Process:
207180
# Data classification:
208-
Definition of simple BCDR practices for citical components:
181+
Definition of simple BCDR practices for critical components:
209182
risk: In case of an emergency, like a power outage, DR actions to perform are not clear. This leads to reaction and remediation delays.
210-
measure: By understanding and documenting a business continuity and disaster recovery (BCDR) plan, the overall availabilitiy of systems and applications is increased. Success factors like responsibilties, Service Level Agreemenmts, Recovery Point Objectives, Recovery Time Objectives or Failover must be fully documentate and understood.
183+
measure: By understanding and documenting a business continuity and disaster recovery (BCDR) plan, the overall availability of systems and applications is increased. Success factors like responsibilities, Service Level Agreements, Recovery Point Objectives, Recovery Time Objectives or Failover must be fully documented and understood.
211184
difficultyOfImplementation:
212185
knowledge: 4
213186
time: 3
214187
resources: 2
215188
usefulness: 4
216189
level: 1
217190

218-
Definition of a change mangement process:
191+
Definition of a change management process:
219192
risk: The impact of a change is not controlled because these are not recorded or documented.
220193
measure: Each change of a system is automatically recorded and adequately logged.
221194
difficultyOfImplementation:
@@ -226,10 +199,8 @@ Process:
226199
level: 3
227200

228201
Approval by reviewing any new version:
229-
risk: An individual might forget to implement security measures to protect source code or infrastructure
230-
components.
231-
measure: On each new version (e.g. Pull Request) of source code or infrastructure
232-
components a security peer review of the changes is performed (two eyes principle) and approval given by the reviewer.
202+
risk: An individual might forget to implement security measures to protect source code or infrastructure components.
203+
measure: On each new version (e.g. Pull Request) of source code or infrastructure components a security peer review of the changes is performed (two eyes principle) and approval given by the reviewer.
233204
difficultyOfImplementation:
234205
knowledge: 2
235206
time: 2

0 commit comments

Comments
 (0)