diff --git a/index.xml b/index.xml index 508e49aa..d222860b 100644 --- a/index.xml +++ b/index.xml @@ -71,7 +71,7 @@ The first stream focuses on removing any subjectivity from the build process by The first stream focuses on establishing a common security baseline to automatically detect so-called “low hanging fruit”. Progressively customize the automated tests for each application and increase their frequency of execution to detect more bugs and regressions earlier, as close as possible to their inception.Software Dependencieshttps://owaspsamm.org/model/implementation/secure-build/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/implementation/secure-build/stream-b/Software Requirementshttps://owaspsamm.org/model/design/security-requirements/stream-a/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/security-requirements/stream-a/Strategy and Metricshttps://owaspsamm.org/model/governance/strategy-and-metrics/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/governance/strategy-and-metrics/Software assurance entails many different activities and concerns. Without an overall plan, you might be spending a lot of effort to build in security, while in fact your efforts may be unaligned, disproportional or even counterproductive. The goal of the Strategy and Metrics (SM) practice is to build an efficient and effective plan for realizing your software security objectives within your organization. A software security program, that selects and prioritizes activities of the rest of the model, serves as the foundation for your efforts.Stream Guidancehttps://owaspsamm.org/stream-guidance/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/stream-guidance/Guidance per Stream in the model What’s SAMM guidance? SAMM is a prescriptive security maturity model that is technology, process, and organization agnostic. The model fits any software development process, industry or environment. However, thanks to that, the prescriptive advice is high level by design. That’s where we bring the guidance documents into play. Their purpose is to provide concrete examples and recommendations to help organizations kickstart their security assurance programme based on SAMM.Supplier Securityhttps://owaspsamm.org/model/design/security-requirements/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/security-requirements/stream-b/Supportershttps://owaspsamm.org/supporters/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/supporters/Organizations supporting SAMM These are companies and organizations who support and have supported SAMM in a variety of ways. For details on how to sponsor SAMM and the benefits of the different levels, see the Sponsor page. -SilverSystem Decommissioning / Legacy Managementhttps://owaspsamm.org/model/operations/operational-management/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/operations/operational-management/stream-b/Technology Managementhttps://owaspsamm.org/model/design/secure-architecture/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/secure-architecture/stream-b/The Modelhttps://owaspsamm.org/model/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/Select a language English Français SAMM model overview Gouvernance Conception Implémentation Vérification Opérations Stratégie & Métriques Évaluation de la menace Génération Sécurisée Évaluation de l'architecture Gestion des incidents Politique & Conformité Exigences de Sécurité Déploiement Sécurisé Tests axés sur les exigences Gestion de l'environnement Éducation & Orientation Architecture de Sécurité Gestion des Défauts Tests de sécurité Gestion opérationnelle Introduction The mission of OWASP Software Assurance Maturity Model (SAMM) is to be the prime maturity model for software assurance that provides an effective and measurable way for all types of organizations to analyze and improve their software security posture.The teamhttps://owaspsamm.org/team/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/team/Who is behind SAMM? SAMM is a community-based project and there have been many contributors throughout its history. +SilverSystem Decommissioning / Legacy Managementhttps://owaspsamm.org/model/operations/operational-management/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/operations/operational-management/stream-b/Technology Managementhttps://owaspsamm.org/model/design/secure-architecture/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/secure-architecture/stream-b/The Modelhttps://owaspsamm.org/model/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/Select a language English Français SAMM model overview Governance Design Implementation Verification Operations Strategy and Metrics Threat Assessment Secure Build Architecture Assessment Incident Management Policy and Compliance Security Requirements Secure Deployment Requirements-driven Testing Environment Management Education and Guidance Secure Architecture Defect Management Security Testing Operational Management Introduction The mission of OWASP Software Assurance Maturity Model (SAMM) is to be the prime maturity model for software assurance that provides an effective and measurable way for all types of organizations to analyze and improve their software security posture.The teamhttps://owaspsamm.org/team/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/team/Who is behind SAMM? SAMM is a community-based project and there have been many contributors throughout its history. The OWASP SAMM community is powered by security knowledgeable volunteers from businesses and educational organizations. This global collective collaborates to create freely-available articles, methodologies, documentation, tools, and technologies. The OWASP SAMM Core Team These are the people who are currently part of the Core Team, participating actively in regular meetings and summits, and contributing to the project with their work.Threat Assessmenthttps://owaspsamm.org/model/design/threat-assessment/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/threat-assessment/The Threat Assessment (TA) practice focuses on identifying and understanding of project-level risks based on the functionality of the software being developed and characteristics of the runtime environment. From details about threats and likely attacks against each project, the organization as a whole operates more effectively through better decisions about prioritization of initiatives for security. Additionally, decisions for risk acceptance are more informed, therefore better aligned to the business. By starting with simple threat models and building application risk profiles, an organization improves over time.Threat Modelinghttps://owaspsamm.org/model/design/threat-assessment/stream-b/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/design/threat-assessment/stream-b/Training and Awarenesshttps://owaspsamm.org/model/Governance/Education%20&%20Guidance/stream-A/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/Governance/Education%20&%20Guidance/stream-A/Training and Awarenesshttps://owaspsamm.org/model/governance/education-and-guidance/stream-a/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/model/governance/education-and-guidance/stream-a/User Dayhttps://owaspsamm.org/user-day/cfp/Mon, 01 Jan 0001 00:00:00 +0000https://owaspsamm.org/user-day/cfp/2024 SAMM User Day! The OWASP SAMM team is thrilled to announce its upcoming User Day, as part of Global AppSec Lisbon, on Wednesday, June 26th. diff --git a/presentations/SUD2024Lisbon/Maturing-SDLC-at-a-Fortune-500-company-based-on-OWASP-SAMM.pptx b/presentations/SUD2024SanFran/Maturing-SDLC-at-a-Fortune-500-company-based-on-OWASP-SAMM.pptx similarity index 100% rename from presentations/SUD2024Lisbon/Maturing-SDLC-at-a-Fortune-500-company-based-on-OWASP-SAMM.pptx rename to presentations/SUD2024SanFran/Maturing-SDLC-at-a-Fortune-500-company-based-on-OWASP-SAMM.pptx diff --git a/user-day/index.html b/user-day/index.html index d287af25..11817483 100644 --- a/user-day/index.html +++ b/user-day/index.html @@ -3,7 +3,7 @@ User Day - go to homepage

User Day

San Francisco

The SAMM team wants to thank everyone who attended our latest User Day. Your active participation, insightful contributions, and enthusiasm helped make it an incredibly enriching and successful event.


Highlights

During the San Francisco User Day, we had talks on topics ranging from the practical applications of SAMM to real-world case studies showcasing its impact. Now, we’d like to share some information and resources with you.

TitleSpeaker
Security Champions: An OWASP SAMM Level Booster!Dustin Lehr
Implementing 5 levels of Capability Maturity Model (CMM) for Secure Software Development Life Cycle (SSDLC)Jamil Ahmed
Influencing Boardroom Strategy: OWASP SAMM as a communication toolDag Flachet
SAMM Benchmark UpdatesAram Hovsepyan, Brian Glas
Rolling out SAMM in established and diverse corporationsNariman Aga-Tagiyev
Maturing SDLC at a Fortune 500 company based on OWASP SAMM: successes and pitfallsSunny Sharma
Round Table: assessment methodologyAll participants

Archive

Here you can find the previous SAMM User Day pages with the full list of talks, downloadable material, and YouTube links.

User Day

San Francisco

The SAMM team wants to thank everyone who attended our latest User Day. Your active participation, insightful contributions, and enthusiasm helped make it an incredibly enriching and successful event.


Highlights

During the San Francisco User Day, we had talks on topics ranging from the practical applications of SAMM to real-world case studies showcasing its impact. Now, we’d like to share some information and resources with you.

TitleSpeaker
Security Champions: An OWASP SAMM Level Booster!Dustin Lehr
Implementing 5 levels of Capability Maturity Model (CMM) for Secure Software Development Life Cycle (SSDLC)Jamil Ahmed
Influencing Boardroom Strategy: OWASP SAMM as a communication toolDag Flachet
SAMM Benchmark UpdatesAram Hovsepyan, Brian Glas
Rolling out SAMM in established and diverse corporationsNariman Aga-Tagiyev
Maturing SDLC at a Fortune 500 company based on OWASP SAMM: successes and pitfallsSunny Sharma
Round Table: assessment methodologyAll participants

Archive

Here you can find the previous SAMM User Day pages with the full list of talks, downloadable material, and YouTube links.