[ISM] SecDevOps practices:

SecDevOps practices are used for application development.

[SSDF] Compliance as code: Specify tools/tool types to mitigate risks (SSS-02-02-01)

Define the necessary tools and tool types in each toolchain to mitigate risks effectively and integrate them seamlessly. This includes categorizing essential tools, identifying security-specific tools, standardizing data formats for tool interaction, evaluating digital signing capabilities for auditability, and leveraging automated technologies to manage and orchestrate the toolchain. These actions ensure that the toolchain is secure, consistent, and auditable within DevOps practices.

[SAMM] Identify tools and technologies (SSS-02-02-01-01 )

Evaluate and identify critical technologies, frameworks, tools, and integrations utilized across applications to ensure security and scalability. Collaborate with architects to analyze the development and operational environments, as well as related artifacts, assessing them for security quality. Recognize that while new technologies may improve efficiency or scalability, they can also introduce risks. Implement processes to manage these risks effectively, including documenting findings and prioritizing mitigation actions. Utilize a structured approach to categorize and integrate tools into the toolchain, ensuring they align with organizational security policies and support secure-by-design principles.

Operations

ID Operation Description Phase Agent
SSS-02-02-01-01-01 Inventory key tools and technologies Identify tools such as React for frontend development, Docker for containerization, and Jenkins for CI/CD. Preparation Architects, Development teams, Security team
SSS-02-02-01-01-02 Assess development and operating environments Review how Kubernetes is configured for application scaling and its implications on security. Development Architects, DevOps team
SSS-02-02-01-01-03 Evaluate security posture of technologies Use tools like Dependency-Check to assess libraries, and CIS Benchmarks to evaluate cloud infrastructure configurations. Development Security team, Architects
SSS-02-02-01-01-04 Report and manage identified risks Report risks such as using an unsupported version of a framework in the defect tracking system and assign them to the team. Deployment Security team, Development leads

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1780)
NIST Secure Software Development Framework (PO.3.1)
OWASP SAMM: Software Assurance Maturity Model (D-SA-1-B)

[SAMM] Promote preferred tools and technologies (SSS-02-02-01-02 )

Establish and maintain a repository of preferred technologies, frameworks, and tools, focusing on those widely used across the organization’s software projects. Ensure this repository includes high-level technologies vetted for security, reliability, and compatibility with organizational goals. When curating this list, assess each tool's incident history, ability to respond to vulnerabilities, functionality relevance, ease of use, and internal familiarity. Engage senior developers, architects, managers, and security auditors to collaboratively identify and validate these recommendations. Share the list across development teams as a trusted source of default tools and perform periodic reviews to address emerging security and operational needs, ensuring continuous alignment with best practices.

Operations

ID Operation Description Phase Agent
SSS-02-02-01-02-01 Identify commonly used tools and technologies Compile a list of common tools like Spring Boot for backend development and React for frontend. Preparation Architects, Development leads, Security auditors
SSS-02-02-01-02-02 Evaluate tools against selection criteria Evaluate Django for security patches and community support compared to similar frameworks. Preparation Senior developers, Architects, Security team
SSS-02-02-01-02-03 Create a recommended tools and technologies list Publish a preferred list including tools like GitHub Actions for CI/CD and PostgreSQL for databases. Development Architects, Development managers, Security team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1780)
NIST Secure Software Development Framework (PO.3.1)
OWASP SAMM: Software Assurance Maturity Model (D-SA-2-B)