Ícone do site Conviso AppSec

Governance according to SAMM: Strategy and Metrics in Application Security

Governança segundo SAMM: Estratégias e Métricas em Segurança de Aplicações

Software security involves many different activities and concerns. Without a clear strategy, you may be spending a lot of effort to increase security, while in fact your efforts may be misaligned, disproportionate or even counterproductive. The goal of Strategy and Metrics (SM) practice is to create an efficient and effective plan to achieve your software security goals in your organization.

Like our slogan at Conviso, software security needs to happen at the speed of your business. An approach that only adds checkpoints and bureaucratic controls directly impacts software delivery and consequently impacts the business.

The SM practice works on plan building, maintenance and dissemination. At the same time, you want to follow your application security posture and implement program improvements. A metrics-driven approach should also be implemented so that you can evaluate the effectiveness of the program and set goals to increase maturity.

  1. Where to start?

The development of such a practice follows a logical sequence involving the following steps:

That is, like any quality model, I follow the already established PDCA model. 

As mentioned in the first article of this series presenting OWASP SAMM, all practices are structured so that maturity is acquired over time, after implementation, evaluation and improvement.

  1. Starting a Program

According to NIST SP 800-39 Managing Information Security Risk every security strategy should be oriented to the risk management strategy of the organization as represented in the image below:

From the risk appetite we build the Application Security program developing the following practices:

  1. Promoting a Program

After the construction of a program with senior management sponsorship and involving the development teams, promote the initiatives within the organization by developing the following practices:

  1. Assessing a Program

William Deming, who despite of not being the creator is considered the father of the PDCA, uttered the following sentence: “You don’t manage what you don’t measure, you don’t measure what you don’t define, you don’t define what you don’t understand, and there is no success in what you don’t manage“.

This principle applies to any program that is implemented in an organization, for Application Security should not be different. We must set goals and follow up to know the model, present results and mainly improve.

We must establish at least three types of metrics:

Many other metrics can be developed according to the necessity and characteristics of the organization. The greatest drive of the metrics is to be able to evaluate if you are gaining maturity in the process.

  1. Improving a Program

Based on the metrics collected and the experiences with the teams, action plans should be established so that the program can be improved. SAMM itself provides an assessment model that allows evaluating each of the program’s practices and establishing plans to reach the next level of maturity. Another reference source to benchmark your process with global companies from various sectors is the Building Security In Maturity Model (BSIMM).

  1. Conclusion

With this first article in the series that will address the implementation and management of an Application Security program, we can see that a well-structured and successful model involves a number of practices that go far beyond the simplest process of code security verification or application intrusion testing (pentest).

SAMM article series

  1. Governance according to SAMM: Strategy and Metrics in Application Security
  2. Governance according to SAMM: Policies and Conformities in Application Security
  3. Governance According to SAMM: Application Security Education and Guidance
  4. Design according to SAMM: Threat Modeling in Application Security
  5. Design According to SAMM: Security Requirements in AppSec
  6. Design according to SAMM – Secure Architecture in Application Security
  7. Implementation according to SAMM: Secure Build in Application Security
  8. Implementation according to SAMM: Secure Deployment in Application Security
  9. Implementation According to SAMM: Defect Management in AppSec
  10. Verification according to SAMM: Application Security Architecture Analysis
  11. Verification according to SAMM: Requirements-Driven Testing in Application Security
  12. Verification according to SAMM: Security Tests in Application Security
  13. Operations according to SAMM: Application Security Incident Management
  14. Operations according to SAMM: Environment Management and Application Security
  15. Operations according to SAMM: Operational Management in Application Security
Sair da versão mobile