SlideShare a Scribd company logo
OWASP SAMM:
Understanding Agile in Security
Software development is…
Agile
Security methodologies for Agile
MS SDL for Agile
MS Security Development Lifecycle (SDL) is a software
development process that helps developers build more
secure software and address security compliance
requirements while reducing development cost
MS SDL for Agile
MS SDL for Agile
MS SDL for Agile
MS SDL is it THAT Agile?
• Needs to be fully implemented
• All functions are necessary
• Doesn’t deal with business restrictions
OWASP SAMM
The Software Assurance
Maturity Model (SAMM) is
an open framework to help
organizations formulate and
implement a strategy for
software security that is
tailored to the specific risks
facing the organization
OWASP SAMM Framework
SAMM. Business function
SAMM. Business function
• Objective
• Activities
• Assessment
• Results
• Success Metrics
• Costs
• Personnel
• Related Levels
SAMM. Business function assessment
SAMM. Assessment via toolbox
SAMM. Defining goals
SAMM. Defining goals
SAMM. Reaching global goals
OWASP SAMM:
What is next?
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
Agile to devops toolbox
SAMM 2.0. Adjusting to devops
SAMM
Overview
Business
Function
Security
Practices
Software Assurance
Lifecycle
Governance Construction Build & Deploy Verification Operations
Threat
Assessment
Security
Requirements
Secure
Architecture
Strategy
& Metrics
Policy &
Compliance
Education &
Guidance
Issue
Management
Environment
Hardening
Operational
Enablement
Design
Analysis
Implementation
Review
Security
Testing
Secure
Build
Secure
Deployment
Defect
Management
SAMM 2.0
SAMM 2.0 is planned to be presented on OWASP 2018
Summer Summit
OWASP SAMM repository:
https://github.com/OWASP/samm/tree/master/v2.0
SAMM. Get involved
Special thanks to Yan Kravchenko – one of the SAMM
developers
If you want to contribute to the project or you just have
some interesting opinions – contact OWASP members
Q&A

More Related Content

PDF
Owasp SAMM v1.5
PPTX
Agile Manifesto and Principles
PPTX
Agile Testing - presentation for Agile User Group
PPTX
Product Owner
PDF
Waterfall vs Agile : A Beginner's Guide in Project Management
PPTX
What's new in the Scaled Agile Framework (SAFe) 6.0 - Agile Indy May 10th Meetup
PPTX
Ch22 project management
PDF
Security champions v1.0
Owasp SAMM v1.5
Agile Manifesto and Principles
Agile Testing - presentation for Agile User Group
Product Owner
Waterfall vs Agile : A Beginner's Guide in Project Management
What's new in the Scaled Agile Framework (SAFe) 6.0 - Agile Indy May 10th Meetup
Ch22 project management
Security champions v1.0

What's hot (20)

PDF
Arquitectura de software
PPTX
Agile Methodology and Tools
PPTX
Security Champions - Introduce them in your Organisation
PPTX
SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...
PPT
Executive Presentation on Agile Project Management by Boardroom Metrics Inc.
PPTX
Agile Mindset Shifting: Agile For All
PPT
1.basics of software testing
PPTX
Secure Software Development Life Cycle
PPTX
Introduction to Scrum
PDF
Agile Scrum Training, Day 1 (1/2)
PPT
TESTING STRATEGY.ppt
PPTX
Secure SDLC Framework
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPTX
Ch14-Software Engineering 9
PPT
Calidad de software
PDF
IBM QRadar Security Intelligence Overview
PPT
IBM AppScan Standard - The Web Application Security Solution
Arquitectura de software
Agile Methodology and Tools
Security Champions - Introduce them in your Organisation
SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...
Executive Presentation on Agile Project Management by Boardroom Metrics Inc.
Agile Mindset Shifting: Agile For All
1.basics of software testing
Secure Software Development Life Cycle
Introduction to Scrum
Agile Scrum Training, Day 1 (1/2)
TESTING STRATEGY.ppt
Secure SDLC Framework
Enterprise Cybersecurity: From Strategy to Operating Model
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Ch14-Software Engineering 9
Calidad de software
IBM QRadar Security Intelligence Overview
IBM AppScan Standard - The Web Application Security Solution
Ad

Similar to Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security (20)

PPTX
A comparative study of process templates in team
PDF
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
PDF
Matteo Meucci - Security Summit 12th March 2019
PDF
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
PPT
Secure Software Development Models and Methods integrated with CMMI.ppt
ODP
Presentation on Agile Testing
PPTX
Agile & Secure SDLC
PPT
Scrum
PPTX
Introduction to Software Engg SDLC, SDLC Models
PDF
Best Practices In Software Development Life Cycle (SDLC)
PPT
Chapter 2 Software Process models of SE.ppt
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
ODP
Hack2Secure Assists Organization in Secure Application Development Through BS...
PDF
Taloring A Clouded Data Security Life Cycle Essay
PPT
PPT
MATURITY LEVEL - CMMI CREATED BY RAMBOE.ppt
PPTX
Powering Safe Launch @ Scale (Feature Flags, Targeting, Experimentation)
PPTX
Computer courses in chandigharh - CBitss Technologies
PPT
Software Process in software engineering
PDF
Sas software-security-framework-107607
A comparative study of process templates in team
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Matteo Meucci - Security Summit 12th March 2019
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
Secure Software Development Models and Methods integrated with CMMI.ppt
Presentation on Agile Testing
Agile & Secure SDLC
Scrum
Introduction to Software Engg SDLC, SDLC Models
Best Practices In Software Development Life Cycle (SDLC)
Chapter 2 Software Process models of SE.ppt
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Hack2Secure Assists Organization in Secure Application Development Through BS...
Taloring A Clouded Data Security Life Cycle Essay
MATURITY LEVEL - CMMI CREATED BY RAMBOE.ppt
Powering Safe Launch @ Scale (Feature Flags, Targeting, Experimentation)
Computer courses in chandigharh - CBitss Technologies
Software Process in software engineering
Sas software-security-framework-107607
Ad

More from OWASP Kyiv (20)

PDF
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
PPTX
Software Supply Chain Security та компоненти з відомими вразливостями
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
PDF
Threat Modeling with OWASP Threat Dragon
PDF
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
PDF
Vlad Styran - Cyber Security Economics 101
PDF
Ivan Vyshnevskyi - Not So Quiet Git Push
PDF
Dima Kovalenko - Modern SSL Pinning
PDF
Yevhen Teleshyk - OAuth Phishing
PDF
Vlada Kulish - Why So Serial?
PDF
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
PDF
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
PDF
Ihor Bliumental - WebSockets
PPTX
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
PDF
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
PPTX
Andriy Shalaenko - GO security tips
PPTX
Vlad Styran - "Hidden" Features of the Tools We All Love
PDF
Volodymyr Ilibman - Close Look at Nyetya Investigation
PDF
Ihor Bliumental - Collision CORS
PPTX
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
Software Supply Chain Security та компоненти з відомими вразливостями
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Threat Modeling with OWASP Threat Dragon
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Vlad Styran - Cyber Security Economics 101
Ivan Vyshnevskyi - Not So Quiet Git Push
Dima Kovalenko - Modern SSL Pinning
Yevhen Teleshyk - OAuth Phishing
Vlada Kulish - Why So Serial?
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
Ihor Bliumental - WebSockets
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
Andriy Shalaenko - GO security tips
Vlad Styran - "Hidden" Features of the Tools We All Love
Volodymyr Ilibman - Close Look at Nyetya Investigation
Ihor Bliumental - Collision CORS
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
gpt5_lecture_notes_comprehensive_20250812015547.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security