Site icon Conviso AppSec

Implementing an Application Security program based on OWASP SAMM

Implementando um programa de segurança de aplicações baseado no OWASP SAMM

Application security is a very broad topic and generally minimized to testing. Seeking to provide more information on the subject and approach in a structured manner, I will write a series of articles addressing all practices of the OWASP SAMM Framework. Every Monday an article will be released detailing a practice, in total there will be 16 articles, this introduction included.

You can also listen to this article:

  1. OWASP SAMM

Initially developed by Pravir Chandra in 2009, the model proposes a set of security practices that meet the entire software lifecycle, including development and acquisition, and is technology and process independent. It is intentionally built to be evolutionary and establishes a 3-level maturity model for each risk-oriented practice.

In its version, 2.0 launched in January 2020 it brings 5 domains with their respective practices:

  1. Objectives of this series

This series of articles aims to detail and discuss each of the practices serving as a reference for students and professionals who wish to expand on application security practices, going far beyond penetration testing in web applications.

It is not the purpose of this series to detail the Assessment process proposed by SAMM.

Upcoming articles of this series

  1. Governance according to SAMM: Strategies and Metrics in Application Security
  2. Governance according to SAMM: Policies and Compliance in Application Security
  3. Governance according to SAMM: Education and Guidance in Application Security 
  4. Design according to SAMM: Threat Modeling in Application Security
  5. Design according to SAMM: Secure Requirements in Application Security
  6. Design according to SAMM: Secure Architecture in Application Security
  7. Implementation according to SAMM: Secure Build in Application Security
  8. Implementation according to SAMM: Secure Deploy in Application Security
  9. Implementation according to SAMM: Defect management in Application Security
  10. Validation according to SAMM: Architecture Assessment in Application Security
  11. Validation according to SAMM: Requirements-Oriented Testing in Application Security
  12. Validation according to SAMM: Security Testing in Application Security
  13. Operations according to SAMM: Incident Management in Application Security
  14. Operations according to SAMM: Environment Management  in Application Security
  15. Operations according to SAMM: Operational Management in Application Security

Exit mobile version