Application Security

Operations according to SAMM: Application Security Incident Management

Continuing the series of publications on the OWASP SAMM framework (Software Assurance Maturity Model), in this article we will address the practice of Incident Management in Application Security, within the Operations domain.

Imagine a scenario, where we had a security incident with one of our applications and now we need to understand what we should do. First, let’s understand what a security incident is.

Application security incidents: what is it?

In short, a security incident refers to any unauthorized or suspicious access, disclosure, modification, or destruction of your application’s data.

In fact, when there is a security compromise of your application, then at this moment we have a Security incident.

In this sense, we need to have a path and a set of clearly defined responsibilities for which the team will act or who will be called to deal with the situation. Remembering that as the OWASP SAMM itself mentions: 

“Many security incidents have been detected months, or even years, after the initial breach. During the ‘wait time’ before an incident is detected, significant damage can occur, increasing the difficulty of recovery. Our first stream of activity, Incident Detection, focuses on decreasing this dwell time.”

The sooner we know when the incident happened, the quicker we can respond and act on it.

Steps in case of application security incidents

If a security incident occurs with your application, you can follow these steps:

  • Identify the root cause of the incident, for example by looking at logs, reviewing code, etc.
  • Determine how long the security issue may have been present;
  • Determine which users of your application were affected and all information that was or could have been compromised;
  • Confirm that any end-user data may have been compromised.

Keeping a few questions in mind is also very important:

  • Could the security incident have had any impact on end-user data? If so, will these end users be notified in accordance with applicable laws or contractual agreements?
  • Do you have an estimated time frame for waiting for the incident to be resolved?
  • What is the category of security incident that occurred, vulnerability, intrusion, data leakage?
  • What corrective actions were taken to remove the root cause of the incident and prevent similar incidents from occurring in the future?
  • What is your plan for communicating with end users about this incident?

This is something that should already be planned, having an incident response plan and having all the steps to resolve it as quickly as possible is essential!

This can be done by following a few steps:

  • Identify your application’s weaknesses.
  • Protect access to sensitive parts of the application.
  • Strengthen security perimeters against future attacks.
  • Unsuccessful attempts should be treated as incidents, this can prepare you for future attacks.


The last phase is to learn from incidents that have occurred, lessons to be learned: Review incident logs to check for possible weaknesses in your configuration, adjust WAF rules and verify or introduce new policies, and always test new rules and stay tuned to false positives.

The incident response lifecycle must be worked on constantly, analysis and detection must flow after the incident to have valuable learning and thus continue to improve your application security and be prepared for future incidents.

Nova call to action

SAMM article series

  1. Governance according to SAMM: Strategy and Metrics in Application Security
  2. Governance according to SAMM: Policies and Conformities in Application Security
  3. Governance According to SAMM: Application Security Education and Guidance
  4. Design according to SAMM: Threat Modeling in Application Security
  5. Design According to SAMM: Security Requirements in AppSec
  6. Design according to SAMM – Secure Architecture in Application Security
  7. Implementation according to SAMM: Secure Build in Application Security
  8. Implementation according to SAMM: Secure Deployment in Application Security
  9. Implementation According to SAMM: Defect Management in AppSec
  10. Verification according to SAMM: Application Security Architecture Analysis
  11. Verification according to SAMM: Requirements-Driven Testing in Application Security
  12. Verification according to SAMM: Security Tests in Application Security
  13. Operations according to SAMM: Application Security Incident Management
  14. Operations according to SAMM: Environment Management and Application Security
  15. Operations according to SAMM: Operational Management in Application Security
Related posts
Application Security

Finding classes for exploiting Unsafe Reflection / Unchecked Class Instantiation vulnerabilities in Java with Joern

During a pentest engagement we found a Java application vulnerable to unsafe reflection [1]. This…
Read more
Application Security

Mitigating Vulnerabilities: Elevating Security Proficiency in Software Development

In the ever-evolving digital landscape, the significance of software security cannot be overstated.
Read more
Application Security

The Importance of Supply Chain to Application Security

When we think about software development, we usually think about complex technical concepts…
Read more

Deixe um comentário