Importancia de la seguridad de la información
¿Por qué crear un programa de seguridad de la información?
Objetivos del programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Políticas de seguridad
Respuesta a incidentes
Gestión de vulnerabilidades
Gestión de riesgos
¿Qué se entiende por Riesgo?
Gestión del Riesgo
Evaluación del Riesgo
Gestión de Controles
Continuidad del negocio
Definiciones y términos
Análisis de impacto de negocio
Software seguro
Desarrollo o adquisición de software seguro
Introducción a OWASP
OWASP Top 10
Modelo de Madurez para el Aseguramiento del Software
Diseño del equipo
Roles, equipos y modelos de seguridad
Pirámide de crecimiento o criterio de contratación
Caso de estudio Platzi
La experiencia de Platzi con ISO27001
You don't have access to this class
Keep learning! Join and start boosting your career
The OWASP SAM (Software Assurance Maturity Model) is a comprehensive approach that will allow you not only to develop software securely, but also to assess the security of the applications you acquire. This model focuses on maturing security practices in five business functions: governance, design, implementation, verification and operations. Consider this as a compass that guides the way to robust and secure software.
While the OWASP Top 10 is a well-known benchmark for the most critical application security risks, OWASP SAM takes that knowledge a step further. Rather than just identifying risks, SAM offers a structured methodology for assessing and improving those areas through a progressive maturity model. This model allows realistic and measurable goals to be set within each business function, providing a clear framework for safe development.
When applying OWASP SAM in software design, it is crucial to perform threat assessments to identify explicit risks to applications under development. This involves understanding the stakeholders and their motivations, as well as defining specific security requirements. For example, following this analysis, you might determine the need to implement specific encryption to protect sensitive data. This approach ensures that security measures are not just reactive, but integral from the software's conception.
One of the great benefits of OWASP SAM is the ability to adapt its application depending on the current maturity level of your organization.
Verification is fundamental to the SAM model. In early stages, it is recommended to incorporate security testing before releasing the software to production. As a higher level of maturity is reached, this testing is integrated into the ongoing development of the product with techniques such as static and dynamic testing. This approach ensures that security is an inherent part of the software lifecycle.
OWASP SAM provides tools, such as a toolbox for Excel or Google Sheets, that make it easy to assess the current security maturity level of your practices. This process starts with an interview where you are asked about your current practices and classified according to three maturity levels. You can then visualize your current status on a radar chart, allowing you to identify areas for improvement and create a realistic action plan to advance the maturity of your security practices.
It is crucial to adapt the SAM model to the characteristics of each organization. For example, a software company might not require the same level of compliance as one in the financial or healthcare sector. Therefore, the phases of the model should be customizable according to the needs and priorities of the business, which helps to define the speed and target level of maturity.
To maximize the benefits of OWASP SAM, it is vital to embark on an initial exercise to tailor the recommendations to the specific conditions and needs of the organization. This process will allow you to experiment and, over time, adjust security practices, thus ensuring continuous improvement in the development and acquisition of secure software.
OWASP SAM is not just a checklist, but a powerful tool for integrating effective security practices, promoting a more secure and robust development environment. Remember that in the world of software development, the race to security has no end goal, but every step you take will bring you closer to excellence.
Contributions 6
Questions 0
Imagino que como el curso es nuevo, se fueron algunos detalles. En la sección de recursos no hay enlaces, ni archivos comentados por el docente. Espero avisen cuando los carguen.
Gracias !
Want to see more contributions, questions and answers from the community?