Risk
3/31/2009
05:04 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Open-Source Security Software Assurance Maturity Model Debuts

OpenSAMM helps organizations formulate a software security strategy tailored to their specific information security risks

San Diego, CA, March 25, 2009 " Many organizations struggle with how to effectively incorporate information security into software development projects, largely due to time and budget constraints. Today, software security expert Pravir Chandra of Cognosticus announced the launch of OpenSAMM, a framework to help organizations formulate a software security strategy tailored to their specific information security risks. OpenSAMM is a prescriptive security framework with sequential, measurable goals that can be used by small, medium and large organizations in any type of business that involves software development.

"While there have been a number of secure development approaches, we wanted to create something that was adaptable and could work in tune with an organization's business goals and risk tolerance," said Pravir. "OpenSAMM is a resource that businesses can use right off the shelf without the need for expensive consultants. It's simple, well-defined, measurable, and enables iterative improvement."

OpenSAMM maps all security related activities under four business functions that are inherent to software development: Governance, Construction, Verification, and Deployment. There are three security practices mapped to each business function and these are the silos for improvement within an organization.

"OpenSAMM has defined the building blocks for effective software security assurance," said Matt Bartoldus, a Director at Gotham Digital Science, an information security consulting firm that works with clients to identify, prevent, and manage security risks and is using OpenSAMM with clients.

"Our clients can use the model to see what needs to be done and what skills and resources are needed to do the job. Best of all, businesses can use OpenSAMM to quantify results and improvements by assessing practices against SAMM activities."

OpenSAMM is useful to any organization that develops software, whether for internal or external use. This includes independent software vendors, online services providers, financial services organizations and government organizations.

One of OpenSAMM's main goals is to build industry standards for software assurance. Though created by Pravir, OpenSAMM was a collaborative effort. "I spent six months getting some of the most experienced practitioners in the industry to review the model and provide feedback. All OpenSAMM content is and will remain vendor-neutral and freely available for all to use," said Pravir, who is an OWASP contributor and member of OWASP Global Projects Committee.

Previous methods have been software lifecycle approaches that require companies to change their development process, are only suitable for large firms with large budgets, are limited to certain types of software, or tie clients to a particular vendor's products.

"From a consultant's perspective, it's impressive to our clients that OpenSAMM has been approved not only by us but also by a number of our industry peers," said Matt. "Plus, its versatility enables us to apply it to our full range of clients, regardless of the size, type of software or method of development.

"OpenSAMM is also presented in a way that makes it easy to get buy-in from our clients. You don't need to be a security expert to understand OpenSAMM's value to your business".

About OpenSAMM

The SAMM project was originally created by Pravir Chandra, Principle Consultant at Cognosticus, OWASP contributor and member of the OWASP Global Projects Committee. For more information on OpenSAMM or to download a copy, please visit http://www.opensamm.org/.

About Gotham Digital Science

Gotham Digital Science (GDS) is an information security consulting firm that works with clients to identify, prevent, and manage security risks. GDS specializes in security testing, software security, and risk management and compliance. GDS develops tools that solve specific security issues and offers a number of security training programs for IT professionals. With offices in New York and London, Gotham Digital Science can seamlessly assist clients on both sides of the Atlantic. For more information, visit our website at http://www.gdssecurity.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web