Skip to content

Commit e525891

Browse files
committed
Review Culture & Organization, level 1
1 parent 8cd0cf9 commit e525891

3 files changed

Lines changed: 51 additions & 45 deletions

File tree

src/assets/YAML/default/CultureAndOrganization/Design.yaml

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -87,25 +87,6 @@ Culture and Organization:
8787
comments: ""
8888
Conduction of simple threat modeling on technical level:
8989
uuid: 47419324-e263-415b-815d-e7161b6b905e
90-
risk:
91-
Technical related threats are discovered too late in the development and
92-
deployment process.
93-
measure:
94-
Threat modeling of technical features is performed during the product
95-
sprint planning.
96-
difficultyOfImplementation:
97-
knowledge: 2
98-
time: 3
99-
resources: 1
100-
usefulness: 3
101-
level: 1
102-
implementation:
103-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/whiteboard
104-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/miro-or-any-other-c
105-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/draw-io
106-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/threat-modeling-play
107-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-samm
108-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/threat-matrix-for-storage
10990
description: |
11091
# OWASP SAMM Description
11192
Threat modeling is a structured activity for identifying, evaluating, and managing system threats, architectural design flaws, and recommended security mitigations. It is typically done as part of the design phase or as part of a security assessment.
@@ -149,6 +130,26 @@ Culture and Organization:
149130
GraphQL queries are dynamically translated to SQL, Elasticsearch and NoSQL queries. Access to data is protected with basic auth set to _1234:1234_ for development purposes.
150131
151132
Source: OWASP Project Integration Project
133+
risk:
134+
Technical related threats are discovered too late in the development and deployment process.
135+
measure: |
136+
Perform threat modeling of technical features during product sprint planning using simple checklists and diagrams. Document identified threats and mitigations for new or changed functionality.
137+
assessment: |
138+
- Evidence of threat modeling activities exists for high-risk applications, including annotated diagrams and documented threats/mitigations.
139+
- Activities are performed during sprint planning and involve relevant stakeholders. Outcomes are recorded and accessible for review.
140+
level: 1
141+
difficultyOfImplementation:
142+
knowledge: 2
143+
time: 3
144+
resources: 1
145+
usefulness: 3
146+
implementation:
147+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/whiteboard
148+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/miro-or-any-other-c
149+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/draw-io
150+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/threat-modeling-play
151+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-samm
152+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/threat-matrix-for-storage
152153
references:
153154
samm2:
154155
- D-TA-2-B

src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,23 @@ Culture and Organization:
44
Education and Guidance:
55
Ad-Hoc Security trainings for software developers:
66
uuid: 12c90cc6-3d58-4d9b-82ff-d469d2a0c298
7-
risk:
8-
Understanding security is hard and personnel needs to be trained on it.
9-
Otherwise, flaws like an SQL Injection might be introduced into the software
10-
which might get exploited.
11-
measure:
12-
Provide security awareness training for all personnel involved in software
13-
development Ad-Hoc.
7+
description: |
8+
Ad-hoc security training provides basic awareness of software security risks and best practices to developers and other personnel involved in software development. These trainings are delivered as needed, without a fixed schedule, to address immediate knowledge gaps or respond to emerging threats.
9+
risk: |
10+
Without any security training, personnel may lack awareness of common software vulnerabilities (such as SQL Injection and vulnerable dependencies), increasing the risk of introducing exploitable flaws into applications.
11+
measure: |
12+
Provide security awareness training for all personnel involved in software development on an ad-hoc basis, ensuring that relevant topics are covered when new risks or needs are identified.
13+
assessment: |
14+
- Conduct security training for developers and relevant personnel
15+
- Participants can identify common software security risks addressed in the training
16+
- Training materials are available
17+
- Attendance records are available
18+
level: 1
1419
difficultyOfImplementation:
1520
knowledge: 2
1621
time: 1
1722
resources: 1
1823
usefulness: 3
19-
level: 1
2024
implementation:
2125
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-juice-shop
2226
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-cheatsheet-series
@@ -407,18 +411,20 @@ Culture and Organization:
407411
comments: ""
408412
Security consulting on request:
409413
uuid: 0b28367b-75a0-4bae-a926-3725c1bf9bb0
410-
risk:
411-
Not asking a security expert when questions regarding security appear
412-
might lead to flaws.
413-
measure:
414-
Security consulting to teams is given on request. The security consultants
415-
can be internal or external.
414+
level: 1
415+
description: |
416+
Security consulting on request allows teams to seek expert advice on security-related questions or challenges as they arise. This support can be provided by internal or external security consultants and helps address specific concerns during software development.
417+
risk: |
418+
If teams do not consult security experts when questions arise, security flaws may be introduced or remain undetected, increasing the risk of vulnerabilities in the software.
419+
measure: |
420+
Make security consulting available to teams on request, ensuring that expert advice is accessible when needed to address security concerns during development.
421+
assessment: |
422+
Records show that teams have access to security consulting services and have used them when needed. Documentation of consultations and resulting actions is available for review.
416423
difficultyOfImplementation:
417424
knowledge: 3
418425
time: 1
419426
resources: 1
420427
usefulness: 3
421-
level: 1
422428
implementation:
423429
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-cheatsheet-series
424430
references:

src/assets/YAML/default/CultureAndOrganization/Process.yaml

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -58,24 +58,23 @@ Culture and Organization:
5858
comments: ""
5959
Definition of simple BCDR practices for critical components:
6060
uuid: c72da779-86cc-45b1-a339-190ce5093171
61-
description:
62-
A _Business Continuity and Disaster Recovery_ (BCDR) is a plan and a process
63-
that helps a business to return to normal operations if a disaster occurs.
64-
risk:
61+
description: |
62+
Business Continuity and Disaster Recovery (BCDR) is a plan and a process that enable an organization to quickly restore normal operations after a disruptive event, such as a cyberattack or natural disaster.
63+
risk: |
6564
If the disaster recovery actions are not clear, you risk slow reaction and remediation delays.
6665
This applies to cyber attacks as well as natural emergencies, such as a power outage.
67-
measure:
68-
By understanding and documenting a business continuity and disaster
69-
recovery (BCDR) plan, the overall availability of systems and applications
70-
is increased. Success factors like responsibilities, Service Level Agreements,
71-
Recovery Point Objectives, Recovery Time Objectives or Failover must be fully
72-
documented and understood by the people involved in the recovery.
66+
measure: |
67+
Develop, document, and communicate a BCDR plan for all critical components. The plan must define roles and responsibilities, Service Level Agreements (SLAs), Recovery Point Objectives (RPOs), Recovery Time Objectives (RTOs), and failover procedures. Ensure all relevant personnel are trained and the plan is reviewed and updated regularly.
68+
assessment: |
69+
- The organization has a documented BCDR plan covering all critical components.
70+
- The plan clearly defines responsibilities, SLAs, RPOs, RTOs, and failover steps.
71+
- Relevant staff are aware of the plan, and evidence of regular review and testing is available.
72+
level: 1
7373
difficultyOfImplementation:
7474
knowledge: 4
7575
time: 3
7676
resources: 2
7777
usefulness: 4
78-
level: 1
7978
implementation: []
8079
references:
8180
samm2: []

0 commit comments

Comments
 (0)