SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Maturity Level 4
Maturity Level 5
App. Hardening Level 1 (50%)
I-AH-1-1: App. Hardening Level 1 (50%)
  • Following frameworks like the OWASP Application Security Verification Standard Level 1 and OWASP Mobile Application Security Verification Standard in all applications provides a good baseline. Implement 50% of the recommendations.
Description

To tackle the security of code developed in-house, OWASP offers an extensive collection of Cheatsheets demonstrating how to implement features securely. Moreover, the Security Knowledge Framework[1] offers an extensive library of code patterns spanning several programming languages. These patterns can be used to not only jumpstart the development process, but also do so securely. [...] The Requirements gathering process tries to answer the question: "What is the system going to do?" At this stage, the SAMM project offers 3 distinct maturity levels covering both in-house software development and third party supplier security. SAMM Requirements Organizations can use these to add solid security considerations at the start of the Software Development or Procurement process. These general security considerations can be audited by using a subsection of the ASVS controls in section V1 as a questionnaire. This process attempts to ensure that every feature has concrete security considerations. In case of internal development and if the organization maps Features to Epics, the Security Knowledge Framework can be used to facilitate this process by leveraging its questionnaire function, shown below. Source: OWASP Project Integration

Risk: Using an insecure application might lead to a compromised application. This might lead to total data theft or data modification.

Context-aware output encoding
I-AH-1-2: Context-aware output encoding
  • Implementing contextualized encoding, such as employing object-relational mapping tools or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
Description

Bear in mind that utilizing frameworks is a recommended approach; however, they can develop known security weaknesses over time. Diligent and regular patching is crucial.

Parametrization
I-AH-1-3: Parametrization
  • Identify which of the types your application is using. Check that you use _parametrized queries_ (or _prepared statements_).
  • For database queries, you may also use _stored procedures_ () and/or ORM (Object-Relational Mapping) tools that automatically handle input sanitization
Description

By concatenating strings from user input to build SQL queries, an attacker can manipulate the query to do other unintentional SQL commands as well. This is called SQL injection but the principle applies to NoSql, and anywhere that your code is building commands that will be executed. Pay attention to these two lines of code. They seem similar, but behave very differently.

  • `sql.execute("SELECT * FROM table WHERE ID = " + id);`
  • `sql.execute("SELECT * FROM table WHERE ID = ?", id);` The second line is parameterized. The same principle applies to other types, such as command line execution, etc.

Risk: Systems vulnerable to injections may lead to data breaches, loss of data, unauthorized alteration of data, or complete database compromise or downtime. This applies to SQL, NoSql, LDAP, XPath, email headers OS commands, etc.