Ícone do site Conviso AppSec

Operations according to SAMM: Application Security Incident Management

Incidentes em Segurança de Aplicações

Continuing the series of publications on the OWASP SAMM framework (Software Assurance Maturity Model), in this article we will address the practice of Incident Management in Application Security, within the Operations domain.

Imagine a scenario, where we had a security incident with one of our applications and now we need to understand what we should do. First, let’s understand what a security incident is.

Application security incidents: what is it?

In short, a security incident refers to any unauthorized or suspicious access, disclosure, modification, or destruction of your application’s data.

In fact, when there is a security compromise of your application, then at this moment we have a Security incident.

In this sense, we need to have a path and a set of clearly defined responsibilities for which the team will act or who will be called to deal with the situation. Remembering that as the OWASP SAMM itself mentions: 

“Many security incidents have been detected months, or even years, after the initial breach. During the ‘wait time’ before an incident is detected, significant damage can occur, increasing the difficulty of recovery. Our first stream of activity, Incident Detection, focuses on decreasing this dwell time.”

The sooner we know when the incident happened, the quicker we can respond and act on it.

Steps in case of application security incidents

If a security incident occurs with your application, you can follow these steps:

Keeping a few questions in mind is also very important:

This is something that should already be planned, having an incident response plan and having all the steps to resolve it as quickly as possible is essential!

This can be done by following a few steps:

Conclusion

The last phase is to learn from incidents that have occurred, lessons to be learned: Review incident logs to check for possible weaknesses in your configuration, adjust WAF rules and verify or introduce new policies, and always test new rules and stay tuned to false positives.

The incident response lifecycle must be worked on constantly, analysis and detection must flow after the incident to have valuable learning and thus continue to improve your application security and be prepared for future incidents.

SAMM article series

  1. Governance according to SAMM: Strategy and Metrics in Application Security
  2. Governance according to SAMM: Policies and Conformities in Application Security
  3. Governance According to SAMM: Application Security Education and Guidance
  4. Design according to SAMM: Threat Modeling in Application Security
  5. Design According to SAMM: Security Requirements in AppSec
  6. Design according to SAMM – Secure Architecture in Application Security
  7. Implementation according to SAMM: Secure Build in Application Security
  8. Implementation according to SAMM: Secure Deployment in Application Security
  9. Implementation According to SAMM: Defect Management in AppSec
  10. Verification according to SAMM: Application Security Architecture Analysis
  11. Verification according to SAMM: Requirements-Driven Testing in Application Security
  12. Verification according to SAMM: Security Tests in Application Security
  13. Operations according to SAMM: Application Security Incident Management
  14. Operations according to SAMM: Environment Management and Application Security
  15. Operations according to SAMM: Operational Management in Application Security
Sair da versão mobile