What is the SCAT process integrity tool and how does it work
What
Writing secure code is only one of the five esential security components that comprise a "Secure Software development process.
The five esential security components of a "Secure Software development process are:
Security governance: Consistant and predictable output, where teams know what to do and when it must be done.
IT risk management: Defined criticality and priority.
Security requirements: In proportion to criticality.
Writing secure code: Correctly and completely implementing the security requirements.
Assurance: Evidence of correct and complete implemention.
SCAT functions as a process integrity tool to overlay the SDLC and implement these esential security components.
How
SCAT process integrity tool enforces a Secure software development process and enables development teams to build, verify and assure secure software.
Build: Integrates a combination of code level guidance and on demand training to define the security requirments before development begins and guide software developers towards its correct implementation.
Verify: Integrates point in time security verification tools to verify that the security requirments are met.
Assure: Integrates an audit trail to centrally store evidence of secure development and testing. Providing traceability through requirements and proving that security requirements were implemented correctly and will operate efficiently over a period of time.
See how development teams use the SCAT process integrity tool
Sprint planning phase
Objective: Generate security requirements before development begins and ensure they are understood
Developers use the Identify risks screen to
Select the critical function to developing/changing
Identify the technologies used
Automatically generate the security requirements and tests
Product owners use the Secure code requirements screen to
Create an audit trail, where the development team will stores evidence proving that the security requirements were met.
Create Jira tickets assigning the security requirements and its accompaning evidence collection tasks to the development teams.
This program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
The OWASP® Foundation works to improve the security of software through its community-led open source software projects,
hundreds of chapters worldwide, tens of thousands of members, and by hosting local and global conferences.