Куда я попал?
OWASP Building Security In Maturity Model
Framework
SE
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
[SE1.2: 102] ENSURE HOST AND NETWORK SECURITY BASICS ARE IN PLACE.
The organization provides a solid foundation for its software in operation by ensuring that host (whether bare metal or virtual machine) and network security basics are in place across its data centers and networks and that these basics remain in place during new releases. Host and network security basics must account for evolving network perimeters, increased connectivity and data sharing, software-defined networking, and increasing dependence on vendors (e.g., content delivery, load balancing, and content inspection services). In addition to securing your production environment, the organization should consider securing their development endpoints [SE3.10] and tool chains [SE3.9]. Doing software security before getting host and network security in place is like putting on shoes before putting on socks. -
[SE2.4: 51] PROTECT CODE INTEGRITY.
Use code protection mechanisms (e.g., code signing) that allow the organization to attest to the provenance, integrity, and authorization of important code. While legacy and mobile platforms accomplished this with point-in-time code signing and permissions activity, protecting modern containerized software demands actions in various lifecycle phases. Organizations can use build systems to verify sources and manifests of dependencies, creating their own cryptographic attestation of both. Packaging and deployment systems can sign and verify binary packages, including code, configuration, metadata, code identity, and authorization to release material. In some cases, organizations allow only code from their own registries to execute in certain environments. Protecting code integrity can also include securing development infrastructure, using permissions and peer review to govern code contributions, and limiting code access to help protect integrity (see [SE3.9]). -
[SE2.5: 64] USE APPLICATION CONTAINERS TO SUPPORT SECURITY GOALS.
The organization uses application containers to support its software security goals. Simply deploying containers isn’t sufficient to gain security benefits, but their planned use can support a tighter coupling of applications with their dependencies, immutability, integrity (see [SE2.4]), and some isolation benefits without the overhead of deploying a full operating system on a virtual machine. Containers are a convenient place for security controls to be applied and updated consistently (see [SFD3.2]), and while they are useful in development and test environments, their use in production provides the needed security benefits. -
[SE2.7: 42] USE ORCHESTRATION FOR CONTAINERS AND VIRTUALIZED ENVIRONMENTS.
The organization uses automation to scale service, container, and virtualized environments in a disciplined way. Orchestration processes take advantage of built-in and add-on security features (see [SFD2.1]), such as hardening against drift, secrets management, RBAC, and rollbacks, to ensure that each deployed workload meets predetermined security requirements. Setting security behaviors in aggregate allows for rapid change when the need arises. Orchestration platforms are themselves software that becomes part of your production environment, which in turn requires hardening and security patching and configuration—in other words, if you use Kubernetes, make sure you patch Kubernetes. -
[SE3.6: 25] CREATE BILLS OF MATERIALS FOR DEPLOYED SOFTWARE.
Create a BOM detailing the components, dependencies, and other metadata for important production software. Use this BOM to help the organization tighten its security posture, i.e., to react with agility as attackers and attacks evolve, compliance requirements change, and the number of items to patch grows quite large. Knowing where all the components live in running software—and whether they’re in private data centers, in clouds, or sold as box products (see [CMVM2.3])—allows for timely response when unfortunate events occur. -
[SE3.8: 3] PERFORM APPLICATION COMPOSITION ANALYSIS ON CODE REPOSITORIES.
Use composition analysis results to augment software asset inventory information with data on all components comprising important applications. Beyond open source (see [SR1.5]), inventory information (see [SM3.1]) includes component and dependency information for internally developed (first-party), commissioned code (second-party), and external (third-party) software, whether that software exists as source code or binary. One common way of documenting this information is to build SBOMs. Doing this manually is probably not an option—keeping up with software changes likely requires toolchain integration rather than carrying this out as a point-in-time activity. This information is extremely useful in supply chain security efforts (see [SM3.5]). -
[SE3.10: 0] PROTECT THE INTEGRITY OF DEVELOPMENT ENDPOINTS.
The organization maintains the integrity of the software it builds by applying security basics to the workstations used by development stakeholders who interact with the development toolchain. Development endpoints are the workstations used for writing source code, configuring the development toolchain, testing the software’s functionality, or modifying data in the code or artifact repositories. Organizations can protect development endpoints by limiting or monitoring privileged actions, ensuring that the operating system and antivirus definitions are up to date, vetting installed software, or by providing a separate, secured workstation for development that is not used for administrative tasks. Establishing and applying a development endpoint security baseline allows for stakeholders to perform the technical tasks required by software development, but also provides another layer of defense to the development toolchain [SE3.9].
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.