[ISM] Secure configuration:

Secure configuration guidance is produced as part of application development.

[SSDF] Apply and enforce secure default settings (SSS-02-09-02)

Apply the secure default settings consistently and document each configuration for software administrators to support secure management practices. Verify that all configurations are approved, record the details of each setting, and use authoritative programmatic mechanisms to enforce configurations. Store these settings with change control to maintain security integrity. This ensures that administrators have clear, reliable guidance for securely configuring and managing the software.

[SAMM] Perform continuous configuration monitoring (SSS-02-09-02-01)

Continuous configuration monitoring ensures that deployed technology stacks adhere to established security baselines. This involves regularly checking configurations for compliance and treating non-conformance as security defects. Corrective actions are managed through defect management practices. Automated measures, such as self-healing configurations and SIEM alerts, can enhance efficiency. Baselines and configuration guides must be regularly reviewed and updated, especially during component updates or at least annually, to ensure they remain accurate and effective. Feedback from teams maintaining these configurations should inform ongoing improvements.

Operations

ID Operation Description Phase Agent
SSS-02-09-02-01-01 Monitor configurations against baselines Regularly check deployed configurations against established baselines using automated or manual methods. Publish results through dashboards or reports to ensure visibility and prompt action. Deployment IT Operations
SSS-02-09-02-01-02 Treat non-conformance as security defects Identify non-conforming configurations as security findings. Manage these findings through established defect management practices to ensure timely remediation and minimize security risks. Deployment Security Teams
SSS-02-09-02-01-03 Leverage automation for self-healing Implement automated measures such as self-healing configurations and SIEM alerts to detect and address non-conformance in real time, reducing manual effort and response time. Post-deployment DevOps Teams
SSS-02-09-02-01-04 Review and update configuration baselines As part of the update process (e.g., new releases, vendor patches), review and update corresponding baselines and configuration guides to maintain relevance. Perform annual reviews of all baselines and guides to ensure alignment with organizational needs and evolving threats. Post-deployment Compliance Teams
SSS-02-09-02-01-05 Incorporate feedback for continuous improvement Periodically review the baseline management process, incorporating feedback and lessons learned from teams managing and applying configuration baselines. Use this input to refine processes and improve overall efficiency and effectiveness. Post-deployment Configuration Management Teams

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1798)
NIST Secure Software Development Framework (PW.9.2)
OWASP SAMM: Software Assurance Maturity Model (O-EM-3-A)