Try this on for size.  JPMC already uses it in practice.

vBSIMM (BSIMM for Vendors)
<http://www.informit.com/articles/article.aspx?p=1703668> (April 12, 2011)



gem


On 7/18/11 8:35 PM, "Anurag Agarwal" <anurag.agar...@yahoo.com> wrote:

>Gary - So my next question is, can we come up with something like BSIMM
>lite, which small or medium size companies with limited resources can use?
>Or maybe pluggable modules, which different companies can pick and choose
>depending on the time and resources they can allocate to it?
>
>My thought process is since we have a comprehensive list of activities
>outlined in BSIMM, we should be able to utilize them unless it is
>something
>which won't work across various types of organizations or dev teams with
>limited resources or other such variables.
>
>What Rohit has outlined in his post is a very small subset of activities
>in
>a secure SDLC methodology. Agreed, most of the companies are allocating
>resources in those activities but that should not be the standard.
>Activities like static code analysis or vulnerability assessment should be
>used to validate threat mitigation and not a source of identifying them,
>since it gives them a false sense of security. The other key element I
>think
>which is required now is the measurement criteria to generate metrics. (I
>don't remember exactly what level of metrics criterias are defined in
>BSIMM)
>but they are a must for a company to assess if they are maturing in their
>process or not otherwise most of the time it ends up being an academic
>exercise and gets bypassed as the deadlines gets near.
>
>Thoughts?
>
>Thanks,
>
>Anurag Agarwal
>MyAppSecurity Inc
>Cell - 919-244-0803
>Email - anu...@myappsecurity.com
>Website - http://www.myappsecurity.com
>Blog - http://myappsecurity.blogspot.com
>LinkedIn - http://www.linkedin.com/in/myappsecurity
>
>
>-----Original Message-----
>From: Gary McGraw [mailto:g...@cigital.com]
>Sent: Monday, July 18, 2011 6:40 PM
>To: Anurag Agarwal; 'Rohit Sethi'; Secure Code Mailing List
>Subject: Re: [SC-L] The Organic Secure SDLC
>
>hi anurag,
>
>The main difference is it is a prescriptive model based on experience
>(opinion?).  The BSIMM is a descriptive model based on observation of over
>40 firms.  Stay tuned for BSIMM3 in September-ish.
>
>gem
>
>p.s. See Cargo Cult Computer
>Security<http://www.informit.com/articles/article.aspx?p=1562220> (January
>28, 2010) for more on prescriptive versus descriptive models.
>
>From: Anurag Agarwal
><anurag.agar...@yahoo.com<mailto:anurag.agar...@yahoo.com>>
>Date: Mon, 18 Jul 2011 15:48:50 -0400
>To: 'Rohit Sethi' <rkli...@gmail.com<mailto:rkli...@gmail.com>>, Secure
>Code
>Mailing List <SC-L@securecoding.org<mailto:SC-L@securecoding.org>>
>Subject: Re: [SC-L] The Organic Secure SDLC
>
>Rohit - How is this different from BSIMM?
>
>Thanks,
>
>Anurag Agarwal
>MyAppSecurity Inc
>Cell - 919-244-0803
>Email - anu...@myappsecurity.com<mailto:anu...@myappsecurity.com>
>Website - http://www.myappsecurity.com
>Blog - http://myappsecurity.blogspot.com
>LinkedIn - http://www.linkedin.com/in/myappsecurity
>
>From: sc-l-boun...@securecoding.org<mailto:sc-l-boun...@securecoding.org>
>[mailto:sc-l-boun...@securecoding.org] On Behalf Of Rohit Sethi
>Sent: Monday, July 18, 2011 2:45 PM
>To: Secure Code Mailing List
>Subject: [SC-L] The Organic Secure SDLC
>
>Hi all,
>
>Over the years we've had the opportunity to see the evolution of security
>in
>software development life cycles (SDLC) at many organizations. We've
>started
>to see patterns in how things evolve from a path of least resistance: from
>the bare minimum of production penetration testing through to security in
>requirements & QA.
>
>In order to help us assess where an organization stands in terms of
>application security maturity, we developed the Organic Secure SDLC model:
>http://www.sdelements.com/secure-sdlc/software-security-throughout-life-cy
>cl
>e-9-steps/
>
>If you're an actual practitioner who has lived through developing a secure
>SDLC I'd love to hear your thoughts about the model's accuracy /
>relevancy.
>
>If you know of any practical whitepapers / articles that might be of use
>to
>somebody responsible for moving to the next in this model then please let
>me
>know.
>
>Cheers,
>
>--
>Rohit Sethi
>SD Elements
>http://www.sdelements.com
>twitter: rksethi
>


_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to