Web application security - the fast guide 1.1 | Page 184

Chapter 9 - Secure Application Development P a g e | 184 SSDL touch points Architecture Analysis (AA) Code Review (CR) Security Testing (ST) Deployment Penetration Testing (PT) Software Environment (SE) Configuration Management & Vulnerability Management (CMVM) BSIMM is similar to SAMM but it considers what called domains instead of business functions and each domain defines a set of security practices. Defined domains are:  Governance: Practices that help organize, manage, and measure a software security initiative. Staff development is also a central governance practice  Intelligence: Practices that result in collections of corporate knowledge used in carrying out software security activities throughout the organization. Collections include both proactive security guidance and organizational threat modeling.  SSDL touch points: Practices associated with analysis and assurance of particular software development artifacts and processes. All software security methodologies include these practices.  Deployment: Practices that interface with traditional network security and software maintenance organizations. Software configuration, maintenance, and other environment issues have direct impact on software security. Unlike SAMM, BSIMM is a quantitative study built by interviewing 30 security executives in organizations with world class security initiatives and according to that study they identified the collective set of different activities undertaken by organizations, and participation level for each activity. so in time where SAMM tells you what you should do (prescriptive) BSIMM describes what the best organization did. Hence BSIMM calculates the maturity level depending on the coverage of specific activities in each security practice. The following table is an example about the list of activities defined in deployment domain, the penetration testing practice.