Web application security - the fast guide 1.1 | Page 182
Chapter 9 - Secure Application Development
5. Build vulnerability
remediation procedures
P a g e | 182
Integrate security analysis into
source management process Integrator
Perform code signing Integrator
Manage security issue disclosure
process
Owner: project manager
Key contributor: designer
Address reported security issues
Owner: designer
Fault reporter
Project manager
Database designer
6. Define and monitor
metrics Monitor security metrics 7. Publish operational
security guidelines Specify database security
configuration
Build operational security guide
Owner: integrator
Key contributor: designer,
architect, implemente
Table 1:CLASP activities and related project roles and best practices (Dan Graham, Introduction to CLASP
Project)
Detailed information about CLASP methodology is available on https://www.us-
cert.gov/bsi/articles/best-practices/requirements-engineering/introduction-to-
the-clasp-process
9.6 Software Assurance Maturity Model (SAMM)
Figure 67:An over view of SAMM Business functions and security practices
SAMM Is an open framework helps establish a software security strategy
customised to fit a special type of risk facing the organization Benefits gained by
using SAMM cover:
Evaluating an organization’s existing software security practices
Building a balanced software security program in well-defined iterations
Demonstrating concrete improvements to a security assurance program
Defining and measuring security-related activities within an organization