1. Homepage
  2. Exam
  3. [2019] INFR11098 SECURE PROGRAMMING - Final Exam - Q3 SAMM

[2019] INFR11098 SECURE PROGRAMMING - Final Exam - Q3 SAMM

This question has been solved
Engage in a Conversation

3. The OWASP Software Assurance Maturity Model (SAMM) aims to help organisations implement a software security (assurance) programme, designed to be: CourseNana.COM

• Evolvable: security programme incrementally delivers assurance gains, while working toward long-term goals; CourseNana.COM

• Adaptable: works for different methodologies, different organisation types and risk tolerances; CourseNana.COM

• Measurable: guidance for activities is prescriptive: simple, well-defined and measurable; CourseNana.COM

• Open: vendor-neutral and available to all. CourseNana.COM

  CourseNana.COM

SAMM is organised around four business functions, each of which has three security practices, shown in the overview below: CourseNana.COM

  CourseNana.COM

Each practice has activities and maturity levels from 0-3, with 0 representing the “doing nothing” starting point and 3 representing “comprehensive mastery of the security practice at scale”. Maturity levels are assigned both by activities undertaken and a measure of how far they are implemented (0.2, 0.5 or 1.0). An organisation’s security programme is assessed against SAMM using a scorecard. CourseNana.COM

  CourseNana.COM

Answer the following questions concerning the OWASP SAMM. CourseNana.COM

(a) The Building Security In Maturity Model (BSIMM) was inspired by an early SAMM version. Using your understanding of BSIMM, explain the main differences between BSIMM and SAMM and what each tries to achieve. [6 marks] CourseNana.COM

(b) Do you think it makes sense for an organisation to use both BSIMM and SAMM? Discuss why or why not. [3 marks] CourseNana.COM

(c) BSIMM has more activities than SAMM but SAMM activities are often more general. Two BSIMM activities which cannot be mapped to SAMM are: CourseNana.COM

Strategy & Metrics        SM3.1              Run an external marketing program. CourseNana.COM

Training                       T3.3                 Host software security events. CourseNana.COM

Explain why these activities are excluded from SAMM. CourseNana.COM

  CourseNana.COM

(d) SAMM aims to help organisations build software security assurance programmes. The idea is to define a roadmap which schedules practices to improve in stages, based on the organisation’s own goals and resources. Figure 2 on page 7 shows three template roadmaps which are proposed in SAMM as templates for three different kinds of organisation: CourseNana.COM

Online Service Provider         Builds web applications and microservices. CourseNana.COM

Entire operation online. Needs to innovate rapidly. CourseNana.COM

Financial Services Company Supports transactions and processing. CourseNana.COM

Many internal and back-end systems. Needs strong reliability and attack resistance. CourseNana.COM

Government Organisation      Builds software for public sector projects. National-level responsibility and visibility. Needs resilience and privacy for large data. CourseNana.COM

  CourseNana.COM

Answer the following questions concerning these different organisation types. CourseNana.COM

i. Considering the three roadmaps in Figure 2, match each one to the organisation type you think best fits the profile shown. For each case, give two reasons why you think the profile matches. You may mention specific example activities as well as practices in your reasons. [9 marks] CourseNana.COM

  CourseNana.COM

ii. For each of the following additional factors, pick one of the organization types you think could be affected, and explain how the additional factor might influence the importance of particular practices and activities within them, leading to adjusting the template roadmap. CourseNana.COM

  CourseNana.COM

Outsourced development significant external development resource. CourseNana.COM

Online payment processing handles payments directly. CourseNana.COM

Regulatory compliance under heavy compliance requirement. CourseNana.COM

Organisation grown by acquisition several development teams are active with different security practices CourseNana.COM

Get the Solution to This Question

WeChat WeChat
Whatsapp WhatsApp
UNIVERSITY OF EDINBURGH代写,INFR11098代写,SECURE PROGRAMMING代写,Perl代写,UNIVERSITY OF EDINBURGH代编,INFR11098代编,SECURE PROGRAMMING代编,Perl代编,UNIVERSITY OF EDINBURGH代考,INFR11098代考,SECURE PROGRAMMING代考,Perl代考,UNIVERSITY OF EDINBURGHhelp,INFR11098help,SECURE PROGRAMMINGhelp,Perlhelp,UNIVERSITY OF EDINBURGH作业代写,INFR11098作业代写,SECURE PROGRAMMING作业代写,Perl作业代写,UNIVERSITY OF EDINBURGH编程代写,INFR11098编程代写,SECURE PROGRAMMING编程代写,Perl编程代写,UNIVERSITY OF EDINBURGHprogramming help,INFR11098programming help,SECURE PROGRAMMINGprogramming help,Perlprogramming help,UNIVERSITY OF EDINBURGHassignment help,INFR11098assignment help,SECURE PROGRAMMINGassignment help,Perlassignment help,UNIVERSITY OF EDINBURGHsolution,INFR11098solution,SECURE PROGRAMMINGsolution,Perlsolution,