Risk
3/31/2009
05:04 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Open-Source Security Software Assurance Maturity Model Debuts

OpenSAMM helps organizations formulate a software security strategy tailored to their specific information security risks

San Diego, CA, March 25, 2009 " Many organizations struggle with how to effectively incorporate information security into software development projects, largely due to time and budget constraints. Today, software security expert Pravir Chandra of Cognosticus announced the launch of OpenSAMM, a framework to help organizations formulate a software security strategy tailored to their specific information security risks. OpenSAMM is a prescriptive security framework with sequential, measurable goals that can be used by small, medium and large organizations in any type of business that involves software development.

"While there have been a number of secure development approaches, we wanted to create something that was adaptable and could work in tune with an organization's business goals and risk tolerance," said Pravir. "OpenSAMM is a resource that businesses can use right off the shelf without the need for expensive consultants. It's simple, well-defined, measurable, and enables iterative improvement."

OpenSAMM maps all security related activities under four business functions that are inherent to software development: Governance, Construction, Verification, and Deployment. There are three security practices mapped to each business function and these are the silos for improvement within an organization.

"OpenSAMM has defined the building blocks for effective software security assurance," said Matt Bartoldus, a Director at Gotham Digital Science, an information security consulting firm that works with clients to identify, prevent, and manage security risks and is using OpenSAMM with clients.

"Our clients can use the model to see what needs to be done and what skills and resources are needed to do the job. Best of all, businesses can use OpenSAMM to quantify results and improvements by assessing practices against SAMM activities."

OpenSAMM is useful to any organization that develops software, whether for internal or external use. This includes independent software vendors, online services providers, financial services organizations and government organizations.

One of OpenSAMM's main goals is to build industry standards for software assurance. Though created by Pravir, OpenSAMM was a collaborative effort. "I spent six months getting some of the most experienced practitioners in the industry to review the model and provide feedback. All OpenSAMM content is and will remain vendor-neutral and freely available for all to use," said Pravir, who is an OWASP contributor and member of OWASP Global Projects Committee.

Previous methods have been software lifecycle approaches that require companies to change their development process, are only suitable for large firms with large budgets, are limited to certain types of software, or tie clients to a particular vendor's products.

"From a consultant's perspective, it's impressive to our clients that OpenSAMM has been approved not only by us but also by a number of our industry peers," said Matt. "Plus, its versatility enables us to apply it to our full range of clients, regardless of the size, type of software or method of development.

"OpenSAMM is also presented in a way that makes it easy to get buy-in from our clients. You don't need to be a security expert to understand OpenSAMM's value to your business".

About OpenSAMM

The SAMM project was originally created by Pravir Chandra, Principle Consultant at Cognosticus, OWASP contributor and member of the OWASP Global Projects Committee. For more information on OpenSAMM or to download a copy, please visit http://www.opensamm.org/.

About Gotham Digital Science

Gotham Digital Science (GDS) is an information security consulting firm that works with clients to identify, prevent, and manage security risks. GDS specializes in security testing, software security, and risk management and compliance. GDS develops tools that solve specific security issues and offers a number of security training programs for IT professionals. With offices in New York and London, Gotham Digital Science can seamlessly assist clients on both sides of the Atlantic. For more information, visit our website at http://www.gdssecurity.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.