"The Building Security In Maturity Model (BSIMM) described on this website is designed to help you understand and plan a software security initiative. BSIMM was created through a process of understanding and analyzing real-world data from nine leading software security initiatives. Though particular methodologies differ (think OWASP CLASP, Microsoft SDL, or the Cigital Touchpoints), many initiatives share common ground. This common ground is captured and described in BSIMM. As an organizing feature, we introduce and use a Software Security Framework (SSF), which provides a conceptual scaffolding for BSIMM. Properly used, BSIMM can help you determine where your organization stands with respect to real-world software security initiatives and what steps can be taken to make your approach more effective."
Topics
Tags
- Announcements (85)
- Articles (51)
- Blue Team (2)
- Books (1)
- Browsers (77)
- Buzzwords (30)
- Commentary (44)
- Compliance (9)
- Cryptography (17)
- CSRF (32)
- Defense (80)
- Demo (2)
- Development (88)
- Events (33)
- Flash (13)
- Forensics (15)
- Funny (96)
- Incidents (213)
- IndustryNews (387)
- Interviews (15)
- Metrics (17)
- Off Topic (29)
- Papers (19)
- Purple Team (1)
- Rant (49)
- Red Team (2)
- Research (166)
- Reviews (17)
- SDL (50)
- Security Tools (113)
- SEO (15)
- Site News (21)
- Surveys (7)
- Tools (29)
- Uncategorized (87)
- Vendors (37)
- Vulns (169)
- WASC (48)
- Web Application Firewalls (18)
- Worms (32)
- XSS (84)
Building Security In Maturity Model is online
Posted by Robert A on
|More information: BSI-MM website
Direct download: PDF Document
Favorite Links
- Security Templates (New)
- The Web Application Security Consortium
- QA Security
- The Web Security Mailing List
- Romain Gaucher’s Blog
- Jeremiah Grossman’s Blog
Popular Pages
WASC Threat Classification
- Abuse of Functionality
- Application Misconfiguration
- Brute Force Attack
- Content Spoofing
- Credential/Session Prediction
- Denial of Service
- Directory Indexing
- Information Leakage
- Remote File Inclusion Attack
- Routing Detour Attack
- SOAP Array Abuse
- XML Attribute Blowup
- XML Injection
- XML External Entity Attack