Difference between revisions of "Category:Software Assurance Maturity Model"

From OWASP
Jump to: navigation, search
m (SAMM Community)
(12 intermediate revisions by 3 users not shown)
Line 1: Line 1:
== Modelo de Auditoría de sistemas:  ==
+
{{OpenSAMM-NoCat}}
  
Éste es un modelo universal para securizar en un alto grado de seguridad al sistema operativo.  
+
= OpenSAMM =
 +
<div style="display:inline;
 +
width:220px; float:right; padding-left:40px; padding-bottom:40px;">
 +
<div style="padding-bottom:10px;">
 +
[https://www.owasp.org/images/c/c0/SAMM-1.0.pdf https://www.owasp.org/images/9/9a/DownloadButton.png]
 +
</div>
 +
<div style="padding-top:10px;">
 +
[http://www.opensamm.org/ Visit the SAMM Website]
 +
[http://www.opensamm.org/ https://www.owasp.org/images/4/44/SAMM-1.0-Cover.png]
 +
</div>
 +
</div>
  
#Sistema de cifrado congelado: Mantiene en secreto la ubicación del archivo del sistema, previniendo ataques de tipo monitoreo de redes.  
+
''OWASP.org is a valuable resource for any company involved with online payment card transactions. Dell uses OWASP’s Software Assurance Maturity Model (OpenSAMM) to help focus our resources and determine which components of our secure application development program to prioritize. Participation in OWASP’s local chapter meetings and conferences around the globe helps us build stronger networks with our colleagues.
#OpenVAS: Línea de comandos para cifrar- descifrar el protocolo TCP/Ip
+
'', ('''Michael J. Craigue, Information Security & Compliance, Dell, Inc.''')
#Filtro Web: Previene intrusiones a través de puertos inseguros
+
#Clam Antivirus: Previene, detecta y corrige virus informático
+
  
<br>
+
The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in:
 +
* '''Evaluating an organization’s existing software security practices'''
 +
* '''Building a balanced software security assurance program in well-defined iterations'''
 +
* '''Demonstrating concrete improvements to a security assurance program'''
 +
* '''Defining and measuring security-related activities throughout an organization'''
  
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
SAMM was defined with flexibility in mind such that it can be utilized by small, medium, and large organizations using any style of development. Additionally, this model can be applied organization-wide, for a single line-of-business, or even for an individual project. Beyond these traits, SAMM was built on the following principles:
 +
* ''An organization’s behavior changes slowly over time'' - A successful software security program should be specified in small iterations that deliver tangible assurance gains while incrementally working toward long-term goals.
 +
* ''There is no single recipe that works for all organizations'' - A software security framework must be flexible and allow organizations to tailor their choices based on their risk tolerance and the way in which they build and use software.
 +
* ''Guidance related to security activities must be prescriptive'' - All the steps in building and assessing an assurance program should be simple, well-defined, and measurable. This model also provides roadmap templates for common types of organizations.
 +
 
 +
The foundation of the model is built upon the core business functions of software development with security practices tied to each (see diagram below). The building blocks of the model are the three maturity levels defined for each of the twelve security practices. These define a wide variety of activities in which an organization could engage to reduce security risks and increase software assurance. Additional details are included to measure successful activity performance, understand the associated assurance benefits, estimate personnel and other costs.
 +
 
 +
[[Image:SAMM-Overview.png|720px]]
 +
 
 +
= Browse Online =
 +
===== Click on any badge to learn more =====
 +
 
 +
{| cellpadding="1"
 +
|[https://www.owasp.org/index.php/SAMM_-_Governance https://www.owasp.org/images/f/f7/G.png]
 
|-
 
|-
| Clam Antivirus
+
|align="center"|'''Strategy & Metrics'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Strategy_&_Metrics|abbr=SM|padding=0}}
 
|-
 
|-
| Filtro Web
+
|align="center"|'''Policy & Compliance'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Policy_&_Compliance|abbr=PC|padding=0}}
 
|-
 
|-
| OpenVAS
+
|align="center"|'''Education & Guidance'''
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
|{{SAMM-BadgeList|name=Education_&_Guidance|abbr=EG|padding=0}}
 +
|-
 +
|[https://www.owasp.org/index.php/SAMM_-_Construction https://www.owasp.org/images/e/ee/C.png]
 +
|-
 +
|align="center"|'''Threat Assessment'''
 +
|{{SAMM-BadgeList|name=Threat_Assessment|abbr=TA|padding=0}}
 +
|-
 +
|align="center"|'''Security Requirements'''
 +
|{{SAMM-BadgeList|name=Security_Requirements|abbr=SR|padding=0}}
 +
|-
 +
|align="center"|'''Secure Architecture'''
 +
|{{SAMM-BadgeList|name=Secure_Architecture|abbr=SA|padding=0}}
 +
|-
 +
|[https://www.owasp.org/index.php/SAMM_-_Verification https://www.owasp.org/images/8/83/V.png]
 +
|-
 +
|align="center"|'''Design Review'''
 +
|{{SAMM-BadgeList|name=Design_Review|abbr=DR|padding=0}}
 +
|-
 +
|align="center"|'''Code Review'''
 +
|{{SAMM-BadgeList|name=Code_Review|abbr=CR|padding=0}}
 +
|-
 +
|align="center"|'''Security Testing'''
 +
|{{SAMM-BadgeList|name=Security_Testing|abbr=ST|padding=0}}
 +
|-
 +
|[https://www.owasp.org/index.php/SAMM_-_Deployment https://www.owasp.org/images/5/54/D.png]
 +
|-
 +
|align="center"|'''Vulnerability Management'''
 +
|{{SAMM-BadgeList|name=Vulnerability_Management|abbr=VM|padding=0}}
 +
|-
 +
|align="center"|'''Environment Hardening'''
 +
|{{SAMM-BadgeList|name=Environment_Hardening|abbr=EH|padding=0}}
 +
|-
 +
|align="center"|'''Operational Enablement'''
 +
|{{SAMM-BadgeList|name=Operational_Enablement|abbr=OE|padding=0}}
 
|-
 
|-
| Sistema de Cifrado Congelado
 
 
|}
 
|}
  
|}
+
= SAMM Community =
 
+
|}
+
 
+
|}
+
 
+
== Descripción softwares de auditoría  ==
+
 
+
*El sistema de cifrado http://truecrypt.org cifra el núcleo del sistema operativo y los discos lógicos impidiendo ataques espía.
+
 
+
*Los comandos shell http://openvas.org sirven para analizar protocolos de red, detección de virus y cifrado del protocolo IpV4-6
+
 
+
*El filtro web http://freenetproject.org es una técnica que reemplaza al Firewall, discriminando puertos inseguros, ahorrando tiempo de procesamiento en el núcleo del sistema.
+
 
+
*Clamwin.com es un software de código abierto, no usa computación en la nube y tiene una GUI que detecta virus en línea http://sourceforge.net/projects/clamsentinel
+
 
+
== Macroinformática  ==
+
 
+
La macroinformática comprende eficiencia, seguridad y naturaleza. La eficacia de un sistema operativo se mide por la interacción hombre-máquina, sintetizando aplicaciones minimalistas y ejecutándolas nuestro sistema operativo procesará los datos eficientemente, ejemplos:
+
 
+
*Transmisión cifrada: Cliente e-mail con GnuPG
+
 
+
http://fellowship.fsfe.org
+
 
+
*Sistema de cifrado: Cifra y descifra texto plano, imágenes, etc..
+
 
+
#ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.11.exe
+
#http://cryptophane.googlecode.com/files/cryptophane-0.7.0.exe
+
 
+
*Ruby: Lenguaje de programación experimental
+
 
+
http://ruby-lang.org
+
 
+
*J2re1.3.1_20: Ejecutable de objetos interactivos o applets
+
 
+
http://java.sun.com/products/archive/j2se/1.3.1_20/index.html
+
 
+
*Escritorio: Gestor de ventanas X11
+
 
+
http://windowmaker.info
+
 
+
*Gnuzilla: Navegador seguro y de uso libre
+
 
+
http://code.google.com/p/iceweaselwindows/downloads/list
+
 
+
*Gnupdf: Visor de formato de texto universal pdf
+
 
+
http://blog.kowalczyk.info/software/sumatrapdf
+
 
+
*Gnuflash: Jugador alternativo a flash player
+
 
+
http://gnu.org/software/gnash
+
 
+
*Zinf: Reproductor de audio
+
 
+
http://zinf.org
+
 
+
*Informática forense: Análisis de datos ocultos en el disco duro
+
 
+
http://sleuthkit.org
+
 
+
*Compresor: Comprime datos sobreescribiendo bytes repetidos
+
 
+
http://peazip.sourceforge.net
+
 
+
*Ftp: Gestor de descarga de archivos
+
 
+
http://dfast.sourceforge.net
+
 
+
*AntiKeylogger: Neutraliza el seguimiento de escritorios remotos (Monitoring)
+
 
+
http://psmantikeyloger.sourceforge.net
+
 
+
*Password manager: Gestión de contraseñas
+
 
+
http://passwordsafe.sourceforge.net
+
 
+
*Limpiador de disco: Borra archivos innecesrios del sistema
+
 
+
http://bleachbit.sourceforge.net
+
 
+
*Desfragmentador: Reordena los archivos del disco duro, generando espacio virtual
+
 
+
http://kessels.com/jkdefrag
+
 
+
*X11: Gestor de ventanas, reemplazo de escritorio Xwindow's
+
 
+
http://bb4win.org
+
 
+
*Open Hardware: Hardware construído por la comunidad Linux
+
 
+
http://open-pc.com
+
 
+
*Open WRT: Firmware libre para configurar transmisión de Internet
+
 
+
http://openwrt.org
+
 
+
*Gnu- Linux: Sistema operativo universal
+
 
+
http://gnewsense.org
+
 
+
== Biocriptoseguridad ==: Es la unión de la biología, criptografía y hacking ético para formar una defensa stándar contra virus complejos.
+
 
+
Implementación de la biocriptoseguridad informática:
+
 
+
#Amplificar la banda ancha
+
#Optimizar (limpiar- modificar) el sistema operativo
+
#Desfragmentar los discos lógicos
+
#Ocultar el sistema operativo
+
#Configurar antivirus
+
#Limpiar y desfragmentar
+
#Congelar
+
 
+
*Sistema inmune._ Defensa biológica natural contra infecciones como virus http://immunet.com
+
  
*Criptografía._ Método de escritura oculta por caractes, números y letras:—{H}/gJa¢K¡Ng÷752%\*)A>¡#(W|a— http://diskcryptor.net
+
Current list of [https://www.owasp.org/index.php/OpenSAMM_Adopters OpenSAMM adopters]
  
*Hacking ético._ Auditoría de sistemas informáticos que preserva la integridad de los datos.
+
If you plan on attending http://appsec.eu or http://appsecusa.org/ be sure to get involved in the SAMM workshops (scheduled on Aug-21 and Nov-20).
  
Congelador: Mantiene el equilibrio en la integridad de los datos, el sistema operativo, red , memoria ram, ciclos de CPU, espacio en disco duro e incidencias de malware
+
Details and agenda to be published in the coming weeks.
  
*http://code.google.com/p/hzr312001/downloads/detail?name=Deep%20systemze%20Standard%20Version%206.51.020.2725.rar&amp;can=2&amp;q= (para Window's)
+
= Project =
*http://sourceforge.net/projects/lethe (para GNU/Linux)
+
{{:Key Project Information:Software Assurance Maturity Model Project}}
  
<br>Auditoría de virus cifrado._ Un criptovirus se oculta tras un algoritmo de criptografía, generalmente es híbrido simétrico-asimétrico con una extensión de 1700bit's, burla los escáneres antivirus con la aleatoriedad de cifrado, facilitando la expansión de las botnet's. La solución es crear un sistema operativo transparente, anonimizarlo y usar herramientas de cifrado stándar de uso libre:  
+
[[Category:OWASP Project]]
 +
[[Category:OWASP Document]]
 +
[[Category:OWASP Alpha Quality Document]]
  
*Gnupg: Sirve para cifrar mensajes de correo electrónico http://gpg4win.org/download.html
 
  
*Open Secure Shell: Ofuscador TcpIp, protege el túnel de comunicación digital cifrando la Ip. http://openvas.org
+
==== Project Activities 2013 ====
 +
2013 Roadmap:<br>
 +
Is available via this [https://docs.google.com/document/d/1y97loS-JqhDjLqGj8gLZdGLT0GHdp50QpLD59W34wQA/edit link]
  
*Red protegida: DNS libre http://namespace.org/switch
 
  
*Criptosistema simétrico: Encapsula el disco duro, incluyendo el sistema operativo,usando algoritmo Twofish http://truecrypt.org/downloads.php
+
Project meeting minutes:
 +
* Last meeting notes 16-June-2013: goto [https://docs.google.com/document/d/1zqajadFNkDhla3_pT8vYmwR1e_qzmVCUtCrBbbDxErs/edit here]
 +
* Kick-off meeting notes / actions 7-Feb 2013: goto [https://docs.google.com/document/d/1H-Oz1UhKUV6SfJlF2TBI9uHzO-ovs8-DIIge7cSEayk/edit here]
  
*Proxy cifrado: Autenticación de usuario anónimo http://torproject.org
+
Download the latest OpenSAMM presentation (was presented by Seba at the Geneva chapter meeting on 25-June-2013) [https://www.owasp.org/images/c/cd/OpenSAMM_-_OWASP_Tour_13_Talk_-_Seba.pptx here]
  
Energías renovables._ Son energías adquiridas por medios naturales: hidrógeno, aire, sol que disminuyen la toxicidad de las emisiones de Co2 en el medio ambiente, impulsando políticas ecologistas contribuímos a preservar el ecosistema. Ejm: Usando paneles solares fotovoltaicos.
+
__NOTOC__
 +
<headertabs/>
 +
<br/>
 +
{{OWASP Book|6888083}}
 +
<br/>

Revision as of 09:26, 24 July 2013

250px-OpenSAMM_logo.png For the latest project news and information,
join the mailing list and visit the OpenSAMM website.


[edit]

OWASP.org is a valuable resource for any company involved with online payment card transactions. Dell uses OWASP’s Software Assurance Maturity Model (OpenSAMM) to help focus our resources and determine which components of our secure application development program to prioritize. Participation in OWASP’s local chapter meetings and conferences around the globe helps us build stronger networks with our colleagues. , (Michael J. Craigue, Information Security & Compliance, Dell, Inc.)

The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in:

  • Evaluating an organization’s existing software security practices
  • Building a balanced software security assurance program in well-defined iterations
  • Demonstrating concrete improvements to a security assurance program
  • Defining and measuring security-related activities throughout an organization

SAMM was defined with flexibility in mind such that it can be utilized by small, medium, and large organizations using any style of development. Additionally, this model can be applied organization-wide, for a single line-of-business, or even for an individual project. Beyond these traits, SAMM was built on the following principles:

  • An organization’s behavior changes slowly over time - A successful software security program should be specified in small iterations that deliver tangible assurance gains while incrementally working toward long-term goals.
  • There is no single recipe that works for all organizations - A software security framework must be flexible and allow organizations to tailor their choices based on their risk tolerance and the way in which they build and use software.
  • Guidance related to security activities must be prescriptive - All the steps in building and assessing an assurance program should be simple, well-defined, and measurable. This model also provides roadmap templates for common types of organizations.

The foundation of the model is built upon the core business functions of software development with security practices tied to each (see diagram below). The building blocks of the model are the three maturity levels defined for each of the twelve security practices. These define a wide variety of activities in which an organization could engage to reduce security risks and increase software assurance. Additional details are included to measure successful activity performance, understand the associated assurance benefits, estimate personnel and other costs.

SAMM-Overview.png

Click on any badge to learn more
G.png
Strategy & Metrics
SM1.png SM2.png SM3.png
Policy & Compliance
PC1.png PC2.png PC3.png
Education & Guidance
EG1.png EG2.png EG3.png
C.png
Threat Assessment
TA1.png TA2.png TA3.png
Security Requirements
SR1.png SR2.png SR3.png
Secure Architecture
SA1.png SA2.png SA3.png
V.png
Design Review
DR1.png DR2.png DR3.png
Code Review
CR1.png CR2.png CR3.png
Security Testing
ST1.png ST2.png ST3.png
D.png
Vulnerability Management
VM1.png VM2.png VM3.png
Environment Hardening
EH1.png EH2.png EH3.png
Operational Enablement
OE1.png OE2.png OE3.png

Current list of OpenSAMM adopters

If you plan on attending http://appsec.eu or http://appsecusa.org/ be sure to get involved in the SAMM workshops (scheduled on Aug-21 and Nov-20).

Details and agenda to be published in the coming weeks.


PROJECT INFORMATION
Project Name Software Assurance Maturity Model (SAMM) Project
Short Project Description

The Software Assurance Maturity Model (SAMM) project is committed to building a usable framework to help organizations formulate and implement a strategy for application security that's tailored to the specific business risks facing the organization. The goal is to create well-defined and measurable goals that can be used by small, medium,and large sized organizations in any line of business that involves software development.
In 2013 SAMM will be improved, see the announcement on the mailing list here.

Key Project Information

Project Leader
Seba Deleersnyder
Project Co-leaders
Pravir Chandra
Kuai Hinojosa
Bart De Win

Project Contibutors
See here

Mailing List
Subscribe here
Use here

License
Creative Commons Attribution Share Alike 3.0

Project Type
Documentation

Sponsors
Fortify
Cognosticus

Release Status Main Links Related Projects

Alpha Quality
Please see here for complete information.



Project Activities 2013

2013 Roadmap:
Is available via this link


Project meeting minutes:

  • Last meeting notes 16-June-2013: goto here
  • Kick-off meeting notes / actions 7-Feb 2013: goto here

Download the latest OpenSAMM presentation (was presented by Seba at the Geneva chapter meeting on 25-June-2013) here



OWASP Books logo.png This project has produced a book that can be downloaded or purchased.
Feel free to browse the full catalog of available OWASP books.


Pages in category "Software Assurance Maturity Model"

The following 45 pages are in this category, out of 45 total.

Media in category "Software Assurance Maturity Model"

The following 2 files are in this category, out of 2 total.