Level 3: High adoption of security practices: Fix rate per repo/product
Description:
Validating Findings by Security Engineers Pros:
- Ensures accuracy and relevance of findings before they reach product teams
- Reduces false positives, saving development teams time and effort
- Might provides a layer of expertise in assessing the severity and impact of vulnerabilities
Validating Findings by Security Engineers Cons:
- Requires a sufficient number of skilled security engineers, which might be challenging for some organizations
- May slow down the process if security engineers are overloaded with validation tasks
- For Software Composition Analysis findings (known vulnerabilities) I, as a sec. eng., struggle to analysis if it is a false positive/true positive due to a lack of insights in the application
Pushing Findings Directly to Product Teams Pros:
- Accelerates the process by immediately notifying product teams of potential vulnerabilities
- Empowers product teams to take swift action in addressing security issues Pushing Findings Directly to Product Teams Cons:
- Increases the workload on product teams, potentially leading to frustration
Risk:
Not integrating vulnerability handling into the development process may result in product teams ignoring findings.
Security joke: We will gain 100% false negatives.
Measure:
Integration of findings into the development process. E.g. adding findings to the backlog of products teams
Difficulty of Implementation:
Knowledge: Medium (two disciplines)
Time: Medium
Resources: Medium
Usefulness:
High
Implementation:
- Jira
- Tags
- documentation
- issue
- proprietary
- URL
- https://jira.atlassian.com/
- Description
- Jira is a bug tracking and project management tool developed by Atlassian, used by development teams for tracking issues, planning sprints, and managing software releases. It offers features for creating and managing tasks, assigning them to team members, and monitoring progress through customizable workflows and dashboards.
- OWASP DefectDojo
- Tags
- vulnerability management system
- owasp
- URL
- https://github.com/DefectDojo/django-DefectDojo
- Description
- DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with DefectDojo.
- Purify
- Tags
- vulnerability management system
- URL
- https://github.com/faloker/purify/
- Description
- The goal of Purify to be an easy-in-use and efficient tool to simplify a workflow of managing vulnerabilities delivered from various (even custom) tools.
- DefectDojo Client
- Tags
- URL
- https://github.com/SDA-SE/defectdojo-client
- Description
- This projects contains the DefectDojo upload client and statistics client. It is for example used within the ClusterImageScanner.
Обязательно
для уровня зрелости
2
3