Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions

被引:0
|
作者
Fucci, Davide [1 ]
Alegroth, Emil [1 ]
Felderer, Michael [1 ,2 ,3 ]
Johannesson, Christoffer [4 ]
机构
[1] Blekinge Inst Technol, Karlskrona, Sweden
[2] German Aerosp Ctr DLR, inst Software Technol, Cologne, Germany
[3] Univ Cologne, Cologne, Germany
[4] Ericsson, Karlskrona, Sweden
关键词
OWASP SAMM; Industry-academia collaboration; Software security;
D O I
10.1016/j.jss.2024.112062
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Background: Recent years have seen a surge in cyber-attacks, which can be prevented or mitigated using software security activities. OWASP SAMM is a maturity model providing a versatile way for companies to assess their security posture and plan for improvements. Objective: We perform an initial SAMM assessment in collaboration with a company in the financial domain. Our objective is to assess a holistic inventory of the company security -related activities, focusing on how different roles perform the assessment and how they perceive the instrument used in the process. Methodology: We perform a case study to collect data using SAMM in a lightweight and novel manner through assessment using an online survey with 17 participants and a focus group with seven participants. Results: We show that different roles perceive maturity differently and that the two assessments deviate only for specific practices making the lightweight approach a viable and efficient solution in industrial practice. Our results indicate that the questions included in the SAMM assessment tool are answered easily and confidently across most roles. Discussion: Our results suggest that companies can productively use a lightweight SAMM assessment. We provide nine lessons learned for guiding industrial practitioners in the evaluation of their current security posture as well as for academics wanting to utilize SAMM as a research tool in industrial settings. Editor's note: Open Science material was validated by the Journal of Systems and Software Open Science Board.
引用
收藏
页数:12
相关论文
共 28 条
  • [1] Climate Change and Security: Different Perceptions, Different Approaches
    Baysal, Basar
    Karakas, Uluc
    [J]. ULUSLARARASI ILISKILER-INTERNATIONAL RELATIONS, 2017, 14 (54): : 21 - 44
  • [2] Evaluating Mobile Banking Application Security Posture Using the OWASP's MASVS Framework
    Chiboora, Trevor Henry
    Chacha, Lenah
    Byagutangaza, Theoneste
    Gueye, Assane
    [J]. PROCEEDINGS OF THE ACM SIGCAS/SIGCHI CONFERENCE ON COMPUTING AND SUSTAINABLE SOCIETIES 2023,COMPASS 2023, 2023, : 99 - 106
  • [3] Evaluating security of software components using analytic network process
    Nazir, Shah
    Shahzad, Sara
    Nazir, Muhammad
    Rehman, Hanif Ur
    [J]. 2013 11TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2013, : 183 - 188
  • [4] Evaluating European railway deregulation using different approaches
    Cantos, Pedro
    Manuel Pastor, Jose
    Serrano, Lorenzo
    [J]. TRANSPORT POLICY, 2012, 24 : 67 - 72
  • [5] Different approaches to evaluating soil quality using biochemical properties
    Gil-Sotres, F
    Trasar-Cepeda, C
    Leirós, MC
    Seoane, S
    [J]. SOIL BIOLOGY & BIOCHEMISTRY, 2005, 37 (05): : 877 - 887
  • [6] Classifying software security requirements into confidentiality, integrity, and availability using machine learning approaches
    Bagies, Taghreed
    [J]. PeerJ Computer Science, 2024, 10 : 1 - 20
  • [7] Evaluating Didactic Approaches used by Teaching Assistants for Software Analysis and Design using UML
    Stikkolorum, D. R.
    de Oliveira Neto, F. Gomes
    Chaudron, M. R., V
    [J]. PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE OF SOFTWARE ENGINEERING EDUCATION (ECSEE), 2018, : 122 - 131
  • [8] Evaluating the sensitivity of DRASTIC using different data sources, interpretations and mapping approaches
    Liggett, Jessica E.
    Allen, Diana M.
    [J]. ENVIRONMENTAL EARTH SCIENCES, 2011, 62 (08) : 1577 - 1595
  • [9] Evaluating the sensitivity of DRASTIC using different data sources, interpretations and mapping approaches
    Jessica E. Liggett
    Diana M. Allen
    [J]. Environmental Earth Sciences, 2011, 62 : 1577 - 1595
  • [10] Analysis of Different Attacks on Software Defined Network and Approaches to Mitigate using Intelligent Techniques
    Karthika, P.
    Karmel, A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 338 - 348