Skip to content

Commit b9e24af

Browse files
committed
Smaller improvements
1 parent 2cacee5 commit b9e24af

3 files changed

Lines changed: 10 additions & 10 deletions

File tree

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ From a startup to a multinational corporation the software development industry
44

55
The OWASP DevSecOps Maturity Model provides opportunities to harden DevOps strategies and shows how these can be prioritized.
66

7-
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
7+
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
88

99
Attackers are intelligent and creative, equipped with new technologies and purpose. Under the guidance of the forward-looking DevSecOps Maturity Model, appropriate principles and measures are at hand implemented which counteract the attacks.
1010

src/assets/Markdown Files/dimensions.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This presents an opportunity for both threat modeling
3737
and attaching security considerations
3838
to every ticket and epic that is the outcome of this stage.
3939

40-
### Design
40+
## Design
4141

4242
There is some great advice on threat modeling out there
4343
*e.g.* [this](https://arstechnica.com/information-technology/2017/07/how-i-learned-to-stop-worrying-mostly-and-love-my-threat-model/)
@@ -59,7 +59,7 @@ An example can be found below._
5959

6060
![Threat Model](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/threat_model.png "Threat Model")
6161

62-
Last, if the organisation maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
62+
Last, if the organization maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
6363

6464
![SKF](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/skf_qs.png "SKF")
6565

@@ -90,7 +90,7 @@ Based on a detailed threat model defined and updated through code, the team deci
9090
* Permissions matrix defined.
9191
* Input is escaped output is encoded appropriately using well established libraries.
9292

93-
### Education and Guidence
93+
## Education and Guidence
9494

9595
Metrics won't necessarily improve without training engineering teams and somehow building a security-minded culture.
9696
Security training is a long and complicated discussion.
@@ -103,7 +103,7 @@ can be used to setup a code based challenge.
103103

104104
![Remediate the Flag](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/rtf.png "Remediate the Flag")
105105

106-
However, if questionnaires are the preferred medium, or if the organisation
106+
However, if questionnaires are the preferred medium, or if the organization
107107
is looking for self-service testing, [Secure Coding Dojo](https://github.com/trendmicro/SecureCodingDojo) is an interesting solution.
108108

109109
More on the self-service side, the Security Knowledge Framework has released
@@ -118,7 +118,7 @@ on Heroku with one click, it offers both CTF functionality and a self-service
118118

119119
![Juice Shop](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/juiceshop.png "Juice Shop")
120120

121-
### Process
121+
## Process
122122

123123
**Example High Maturity Scenario:**
124124

@@ -135,7 +135,7 @@ hardening of software and infrastructure components.
135135
There is an abundance of libraries and frameworks implementing
136136
secure defaults.
137137
For frontend development, [ReactJS](https://reactjs.org/) seems to be
138-
the latest favourite in the Javascript world.
138+
the latest favorite in the Javascript world.
139139

140140
On the database side, there are [ORM](https://sequelize.org/) libraries
141141
and [Query Builders](https://github.com/kayak/pypika) for most languages.
@@ -214,7 +214,7 @@ and [Prometheus](https://prometheus.io/docs/introduction/overview/) can be used
214214
However, no matter the WAFs, Logging, and secure configuration enforced
215215
at this stage, incidents will occur eventually.
216216
Incident management is a complicated and high stress process.
217-
To prepare organisations for this, SAMM includes a section on [incident management](https://owaspsamm.org/model/operations/incident-management/) involving simple questions for stakeholders to answer so you can determine incident preparedness accurately.
217+
To prepare organizations for this, SAMM includes a section on [incident management](https://owaspsamm.org/model/operations/incident-management/) involving simple questions for stakeholders to answer so you can determine incident preparedness accurately.
218218

219219
**Example High Maturity scenario:**
220220

@@ -252,7 +252,7 @@ Instructions can be found [here](https://owaspsamm.org/model/verification/) and
252252
![SAMM Testing](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/samm_testing.png "SAMM Testing")
253253

254254
Testing can be performed several ways and it highly depends on the nature
255-
of the software, the organisation's cadence, and the regulatory requirements among other things.
255+
of the software, the organization's cadence, and the regulatory requirements among other things.
256256

257257
If available, automation is a good idea as it allows detection of easy to find vulnerabilities without much human interaction.
258258

src/assets/Markdown Files/maturity-level-0.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ The first steps for deploying DSOMM are then the following:
100100

101101
- The "Risk Manager" is aware that all software have security vulnerabilities,
102102
and that the related risks should be minimized
103-
- Knowing the risk appetite XXXXXX
103+
- Knowing the risk appetite helps the organization align its security efforts with its overall strategic goals
104104
- Resources must be allocated to improve security and
105105
to avoid, detect and fix vulnerabilities
106106
- Management can perform well informed risk decisions

0 commit comments

Comments
 (0)