You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ From a startup to a multinational corporation the software development industry
4
4
5
5
The OWASP DevSecOps Maturity Model provides opportunities to harden DevOps strategies and shows how these can be prioritized.
6
6
7
-
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
7
+
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
8
8
9
9
Attackers are intelligent and creative, equipped with new technologies and purpose. Under the guidance of the forward-looking DevSecOps Maturity Model, appropriate principles and measures are at hand implemented which counteract the attacks.
Last, if the organisation maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
62
+
Last, if the organization maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
@@ -135,7 +135,7 @@ hardening of software and infrastructure components.
135
135
There is an abundance of libraries and frameworks implementing
136
136
secure defaults.
137
137
For frontend development, [ReactJS](https://reactjs.org/) seems to be
138
-
the latest favourite in the Javascript world.
138
+
the latest favorite in the Javascript world.
139
139
140
140
On the database side, there are [ORM](https://sequelize.org/) libraries
141
141
and [Query Builders](https://github.com/kayak/pypika) for most languages.
@@ -214,7 +214,7 @@ and [Prometheus](https://prometheus.io/docs/introduction/overview/) can be used
214
214
However, no matter the WAFs, Logging, and secure configuration enforced
215
215
at this stage, incidents will occur eventually.
216
216
Incident management is a complicated and high stress process.
217
-
To prepare organisations for this, SAMM includes a section on [incident management](https://owaspsamm.org/model/operations/incident-management/) involving simple questions for stakeholders to answer so you can determine incident preparedness accurately.
217
+
To prepare organizations for this, SAMM includes a section on [incident management](https://owaspsamm.org/model/operations/incident-management/) involving simple questions for stakeholders to answer so you can determine incident preparedness accurately.
218
218
219
219
**Example High Maturity scenario:**
220
220
@@ -252,7 +252,7 @@ Instructions can be found [here](https://owaspsamm.org/model/verification/) and
0 commit comments