Skip to content

Commit 80248f3

Browse files
committed
feat(next-devsecops): "Understand the Threat Model" draft
1 parent 9b154b2 commit 80248f3

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

2019/en/src/0xb1-next-devsecops.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ What's Next For DevSecOps
33

44
Due to their importance in modern application architectures, building secure
55
APIs is crucial. Security can not be neglected and it should be part of the
6-
whole development life-cycle. Scanning and penetration testing on a yearly basis
7-
are not enough anymore.
6+
whole development life-cycle. Scanning and penetration testing yearly are not
7+
enough anymore.
88

99
DevSecOps should join the development effort, facilitating continuous security
1010
testing across the entire software development life-cycle. Their goal is to
@@ -15,10 +15,12 @@ In case of doubt, better refreshing the [DevSecOps Manifesto][1].
1515

1616
| | |
1717
|-|-|
18-
| **Understand the Threat Model** | b |
19-
| **Understand the SDLC** | |
18+
| **Understand the Threat Model** | Testing priorities come from a threat model. If you don't have one, consider using [OWASP Application Security Verification Standard (ASVS)][2] and the [OWASP Testing Guide][3] as an input. Involving the development team may help to make them more security-aware. |
19+
| **Understand the SDLC** | Join the development team to better understand the Software Development Lifecycle. Your contribution on continuous security testing should be compatible with people, processes and tools. Everyone should agree with the process so that there's no unnecessary friction or resistance. |
2020
| **Testing Strategies** | |
2121
| **Achieving Coverage and Accuracy** | |
2222
| **Clearly Communicate Findings** | Contribute value with less or no friction. Deliver findings in a timely fashion, in the tools development teams are using (not PDF files). Join the development team to address the findings. Take the opportunity to educate them, clearly describing the weakness and how it can be abused, including an attack scenario to make it real. |
2323

2424
[1]: https://www.devsecops.org/
25+
[2]: https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
26+
[3]: https://www.owasp.org/index.php/OWASP_Testing_Project

0 commit comments

Comments
 (0)