Dated: 03-12-2024
Ch03. Software Security Hardening Fundamentals - Owasp Samm - 2
-
Software Assurance Maturity Model (SAMM) developed by OWASP
-
OWASP Software Assurance Maturity Model (SAMM)
- Construction Phase:
- Security Requirements
- Threat Assessment
- Secure Architecture
- Construction Phase:
- Security Requirements:
- Threat Assessment:
- Centered on identification and understanding the project-level risks based on the functionality of the software being developed and characteristics of the runtime environment from details about threats and likely attacks against each project, the organization as a whole operates more effectively through better decisions about prioritization of initiatives for security
- Centered on identification and understanding the project-level risks based on the functionality of the software being developed and characteristics of the runtime environment from details about threats and likely attacks against each project, the organization as a whole operates more effectively through better decisions about prioritization of initiatives for security
- Secure Architecture:
- Policy & Compliance:
- By enhancing the software design process with reusable services and components, the overall security risk from software development can be dramatically reduced.
- SAMM is an excellent model for software security and we look at the verification and deployment phases as part of testing and validation (future module)
Post Assessments
_ is the goal of the Secure Architecture phase in SAMMs Construction
- Identifying and understanding project-level risks
- Designing and building secure software by default
- Centering on prioritization of security initiatives
- Gathering security requirements based on business purpose
SAMMs Construction phase contributes to reducing overall security risks in software development by _
- enhancing the design process with reusable services
- conducting project-level audits
- implementing strict compliance policies
- prioritizing security initiatives