Skip to main content

Security validation dimension

1 - Reactive

Description

  • The tribe lacks a systematic approach to security testing.
  • There is little to no formal understanding of security requirements, and testing for security vulnerabilities is inconsistent.
  • Security vulnerabilities are often discovered post-development or accidentally.
  • No formalized security testing tools or processes are in place.
  • There's no clear ownership or responsibility for the security approach at the product level.

2 - Managed

Description

  • The tribe has begun to recognize the importance of security testing.
  • The tribe might occasionally use tools or methodologies but lack a standardized process.
  • Issues are often reactive - identified in response to specific threats or incidents.
  • Common security vulnerabilities are checked for, often right before the release.
  • Training and awareness on security best practices are minimal.

3 - Defined

Description

  • Security strategy, practices and testing are formalized and integrated into the software development lifecycle (SDLC).
  • There's an established process for identifying, tracking, prioritizing, and addressing vulnerabilities.
  • Regular use of automated vulnerability scanning tools.
  • Regular security testing is performed, and the outcomes of these tests are utilized to enhance security measures further.
  • There's an established process for responding to security incidents and to learn from these incidents to prevent future occurrences.
  • Security results are documented, analyzed, and shared with relevant stakeholders.
  • Root cause analysis is performed on major defects, leading to proactive defect prevention. The results of the analysis are tracked in a consistent format over time, at the tribe level.
  • Tribe members are trained in security development and validation best practices.

4 - Measured

Description

  • Security testing at this level is proactive and well-integrated into the development lifecycle.
  • The tribe employs automated tools, regular penetration testing, and code review practices focused on security.
  • Metrics are collected and analyzed to improve the security testing process.
  • A dedicated security expert or team may be on board, and ongoing training ensures the entire development team is aware of and practices security best practices.
  • Continuous security testing and scanning integrated into CI/CD.

5 - Optimized

Description

  • The tribe actively learns from past vulnerabilities, integrates feedback from various sources (e.g., bug bounty programs), and adapts its processes and tools accordingly.
  • Security testing practices are regularly reviewed and refined for optimal effectiveness.

Guiding questions

  1. Security Integration: How well is security integrated into your software development lifecycle, and at what stages are security measures most prominently implemented?
  2. Vulnerability Detection and Management: What processes and tools are in place for identifying, tracking, and resolving security vulnerabilities within your software, and how effective have they been in the past?
  3. Risk Assessment and Mitigation: How do you assess and prioritize security risks during development, and what strategies are employed to mitigate these risks?
  4. Security Testing and Validation Methods: What types of security testing (e.g., static or dynamic analysis, penetration testing) are routinely conducted, and how are the results of these tests used to improve security?
  5. Incident Response and Postmortem Analysis: How does your tribe respond to security incidents, and what measures are taken to learn from these incidents to prevent future occurrences?
  6. Threat Modeling: How is threat modeling conducted and incorporated into the design and development phases?
  7. Developer Security Training and Awareness: What training and resources are provided to developers to enhance their understanding of security best practices, and how is this knowledge applied in your projects?