Skip to content

Commit d489c3b

Browse files
authored
add more references to the Security Culture project
2 parents a035dd0 + 0fb5b9f commit d489c3b

File tree

15 files changed

+76
-29
lines changed

15 files changed

+76
-29
lines changed

draft/04-foundations/00-toc.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,12 @@ software security for the application or system under development.
2424
This Developer Guide can only give a brief overview of these concepts,
2525
for in-depth knowledge refer to the many texts on security such as the [The Cyber Security Body Of Knowledge][cbok].
2626

27+
If changes are being introduced to the security culture of an organization
28+
then make sure there is management buy-in and clear goals to achieve.
29+
Without these then attempts to improve the security posture will probably fail - see the
30+
[Security Culture][culturegoal] project for the importance of getting management,
31+
security and development teams working together.
32+
2733
Sections:
2834

2935
2.1 [Security fundamentals](#security-fundamentals)
@@ -37,6 +43,7 @@ Sections:
3743
The OWASP Developer Guide is a community effort; if there is something that needs changing then [submit an issue][issue0400].
3844

3945
[cbok]: https://www.cybok.org/
46+
[culturegoal]: https://owasp.org/www-project-security-culture/stable/3-Goal_Setting_and_Security_Team_Collaboration/
4047
[issue0400]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2004-foundations/00-toc
4148

4249
\newpage

draft/04-foundations/02-secure-development.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ permalink: /draft/foundations/secure_development/
2626

2727
Secure development is described in the OWASP Software Assurance Maturity Model [(SAMM)][samm]
2828
[Design][sammd], [Implementation][sammi] and [Verification][sammv] business functions.
29+
Also refer to the [Security Culture][culturewhy] for a good explanation
30+
on why adding security into the software development lifecycle is important.
2931

3032
#### Prelude
3133

@@ -204,6 +206,7 @@ then [submit an issue][issue0402] or [edit on GitHub][edit0402].
204206
[csproject]: https://owasp.org/www-project-cheat-sheets/
205207
[csrfguard]: https://owasp.org/www-project-csrfguard/
206208
[culture]: https://owasp.org/www-project-security-culture/
209+
[culturewhy]: https://owasp.org/www-project-security-culture/stable/2-Why_Add_Security_In_Development_Teams/
207210
[cyclone]: https://owasp.org/www-project-cyclonedx/
208211
[depcheck]: https://owasp.org/www-project-dependency-check/
209212
[deptrack]: https://dependencytrack.org/

draft/04-foundations/toc.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,12 @@ software security for the application or system under development.
3535
This Developer Guide can only give a brief overview of these concepts,
3636
for in-depth knowledge refer to the many texts on security such as the [The Cyber Security Body Of Knowledge][cbok].
3737

38+
If changes are being introduced to the security culture of an organization
39+
then make sure there is management buy-in and clear goals to achieve.
40+
Without these then attempts to improve the security posture will probably fail - see the
41+
[Security Culture][culturegoal] project for the importance of getting management,
42+
security and development teams working together.
43+
3844
Sections:
3945

4046
2.1 [Security fundamentals](01-security-fundamentals.md)
@@ -49,5 +55,6 @@ The OWASP Developer Guide is a community effort; if there is something that need
4955
then [submit an issue][issue0400] or [edit on GitHub][edit0400].
5056

5157
[cbok]: https://www.cybok.org/
58+
[culturegoal]: https://owasp.org/www-project-security-culture/stable/3-Goal_Setting_and_Security_Team_Collaboration/
5259
[edit0400]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/04-foundations/toc.md
5360
[issue0400]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2004-foundations/00-toc

draft/06-design/01-threat-modeling/01-threat-modeling.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ The deliverables from threat modeling take various forms including system models
2929
mitigations or assumptions, meeting notes, and more.
3030
This may be assembled into a single threat model document; a structured representation of all the information
3131
that affects the security of an application.
32+
A good overview of this activity is given in the [Security Culture][culturetm] project section on threat modeling.
33+
3234
In essence, it is a view of the application and its environment through security glasses.
3335

3436
Threat modeling is a process for capturing, organizing, and analyzing all of this information
@@ -267,6 +269,7 @@ then [submit an issue][issue060101] or [edit on GitHub][edit060101].
267269
[corncards]: https://owasp.org/www-project-cornucopia/
268270
[ccsnet]: https://cheatsheetseries.owasp.org/cheatsheets/Network_Segmentation_Cheat_Sheet
269271
[cstm]: https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet
272+
[culturetm]: https://owasp.org/www-project-security-culture/stable/6-Threat_Modelling/
270273
[eop]: https://shostack.org/games/elevation-of-privilege
271274
[edit060101]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/06-design/01-threat-modeling/01-threat-modeling.md
272275
[issue060101]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2006-design/01-threat-modeling/01-threat-modeling

draft/08-verification/00-toc.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,9 @@ These activities are supported by:
3737
* Vulnerability management
3838
* Checklists
3939

40+
Verification is an activity central to the secure software development lifecycle.
41+
Refer to the [Security Culture][culturetest] project section for the various types of security testing.
42+
4043
Sections:
4144

4245
6.1 [Guides](#verification-guides)
@@ -58,6 +61,7 @@ Sections:
5861

5962
The OWASP Developer Guide is a community effort; if there is something that needs changing then [submit an issue][issue0800].
6063

64+
[culturetest]: https://owasp.org/www-project-security-culture/stable/7-Security_Testing/
6165
[issue0800]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2008-verification/00-toc
6266
[samm]: https://owaspsamm.org/about/
6367
[sammv]: https://owaspsamm.org/model/verification/

draft/08-verification/04-vulnerability-management/01-defectdojo.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,12 @@ and with time more integrations with threat modeling tools will become available
5959

6060
#### How to use it
6161

62-
Testing or installing DefectDojo is straight forward using the [installation instructions][defectdojo-install].
63-
An instance of DefectDojo can be setup using [docker compose][defectdojo-docker] along with the associated scripts
64-
that handle the dependencies, configure the database, create users and so on.
65-
Refer to the DefectDojo [documentation][defectdojo-docs] for all the information on alternative deployments,
62+
Testing or installing DefectDojo is straight forward using the [installation instructions][defectdojo-install];
63+
the recommended way to run DefectDojo is using a container.
64+
65+
To set up an instance of DefectDojo follow the [docker compose][defectdojo-docker] instructions along with
66+
the associated scripts that handle the dependencies, configure the database, create users and so on.
67+
Refer to the DefectDojo [documentation][defectdojo-docs] for further information on alternative deployments,
6668
setting up, usage and integrations.
6769

6870
#### References
@@ -77,9 +79,9 @@ The OWASP Developer Guide is a community effort; if there is something that need
7779
then [submit an issue][issue080401] or [edit on GitHub][edit080401].
7880

7981
[defectdojo]: https://www.defectdojo.com/
80-
[defectdojo-docs]: https://defectdojo.github.io/django-DefectDojo/
82+
[defectdojo-docs]: https://documentation.defectdojo.com/
8183
[defectdojo-docker]: https://github.com/DefectDojo/django-DefectDojo/blob/dev/readme-docs/DOCKER.md
82-
[defectdojo-install]: https://defectdojo.github.io/django-DefectDojo/getting_started/installation/
84+
[defectdojo-install]: https://documentation.defectdojo.com/getting_started/installation/
8385
[defectdojo-project]: https://owasp.org/www-project-defectdojo/
8486
[defectdojo-tools]: https://www.defectdojo.com/integrations
8587
[edit080401]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/08-verification/04-vulnerability-management/01-defectdojo.md

draft/08-verification/toc.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,9 @@ These activities are supported by:
4848
* Vulnerability management
4949
* Checklists
5050

51+
Verification is an activity central to the secure software development lifecycle.
52+
Refer to the [Security Culture][culturetest] project section for the various types of security testing.
53+
5154
Sections:
5255

5356
6.1 [Guides](01-guides/toc.md)
@@ -70,6 +73,7 @@ Sections:
7073
The OWASP Developer Guide is a community effort; if there is something that needs changing
7174
then [submit an issue][issue0800] or [edit on GitHub][edit0800].
7275

76+
[culturetest]: https://owasp.org/www-project-security-culture/stable/7-Security_Testing/
7377
[edit0800]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/08-verification/toc.md
7478
[issue0800]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2008-verification/00-toc
7579
[samm]: https://owaspsamm.org/about/

draft/09-training-education/00-toc.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,13 @@ development, testing, or auditing of the applications and systems.
2626
In addition a Learning Management System or equivalent should be in place to track
2727
the employee training and certification processes.
2828

29-
OWASP provides various resources and environments that can help with this security training and education.
29+
It is important to provide activities for development teams;
30+
we are all human and our security knowledge can become stale without a plan for refreshing it.
31+
The [Security Culture][cultureacts] project describes various activities that can help developers
32+
keep up to date and motivated.
33+
34+
OWASP provides various resources and environments that can help with this security training and education
35+
ranging from vulnerable applications, training platforms and gamification.
3036

3137
Sections:
3238

@@ -48,6 +54,7 @@ Sections:
4854

4955
The OWASP Developer Guide is a community effort; if there is something that needs changing then [submit an issue][issue0900].
5056

57+
[cultureacts]: https://owasp.org/www-project-security-culture/stable/5-Activities/
5158
[issue0900]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2009-training-education/00-toc
5259
[sammg]: https://owaspsamm.org/model/governance/
5360
[sammgeg]: https://owaspsamm.org/model/governance/education-and-guidance/

draft/09-training-education/06-mobile-top-ten.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ but they can be applied at any time during development.
7373
The Mobile Top 10 was [first released in 2014][mobile10-2014], [updated in 2016][mobile10-2016]
7474
with the latest version [released in 2024][mobile10-2023].
7575

76-
The list of mobile application [controls][mobile10controls] were originally published in 2011
77-
as the '[Smartphone Secure Development Guideline][ssdg-2011]'. This was then revised during 2016
78-
and [released in February 2017][ssdg-2017] to inform the latest set of mobile application controls.
76+
The list of mobile application [controls][mobile10controls] were originally published in 2011 by [ENISA][enisa]
77+
as the 'Smartphone Secure Development Guideline'.
78+
This was then revised during 2016, released in February 2017, to inform the latest set of mobile application controls.
7979

8080
----
8181

@@ -101,7 +101,5 @@ then [submit an issue][issue0906] or [edit on GitHub][edit0906].
101101
[mobile10-2023]: https://owasp.org/www-project-mobile-top-10/2023-risks/
102102
[mobile10controls]: https://owasp.org/www-project-mobile-top-10/#div-controls
103103
[mobile10repo]: https://github.com/OWASP/www-project-mobile-top-10/blob/master/README.md
104-
[ssdg-2011]: https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines/at_download/fullReport
105-
[ssdg-2017]: https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines-2016
106104

107105
\newpage

draft/09-training-education/toc.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,13 @@ development, testing, or auditing of the applications and systems.
3737
In addition a Learning Management System or equivalent should be in place to track
3838
the employee training and certification processes.
3939

40-
OWASP provides various resources and environments that can help with this security training and education.
40+
It is important to provide activities for development teams;
41+
we are all human and our security knowledge can become stale without a plan for refreshing it.
42+
The [Security Culture][cultureacts] project describes various activities that can help developers
43+
keep up to date and motivated.
44+
45+
OWASP provides various resources and environments that can help with this security training and education
46+
ranging from vulnerable applications, training platforms and gamification.
4147

4248
Sections:
4349

@@ -60,6 +66,7 @@ Sections:
6066
The OWASP Developer Guide is a community effort; if there is something that needs changing
6167
then [submit an issue][issue0900] or [edit on GitHub][edit0900].
6268

69+
[cultureacts]: https://owasp.org/www-project-security-culture/stable/5-Activities/
6370
[edit0900]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/09-training-education/toc.md
6471
[issue0900]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2009-training-education/00-toc
6572
[sammg]: https://owaspsamm.org/model/governance/

0 commit comments

Comments
 (0)