SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Identify software attack surface
790: Do project teams document the attack perimeter of software designs?
  • Each project group creates a simplified one-page architecture diagram representing high-level modules.
  • Each component in the diagram is analyzed in terms of accessibility of the interface from authorized users, anonymous users, operators, application-specific roles, etc.
  • Interfaces and components with similar accessibility profiles are grouped and documented as the software attack surface.
  • One-page architecture diagram is annotated with security-related functionality.
  • Grouped interface designs are evaluated to determine whether security-related functionality is applied consistently.
  • Architecture diagrams and attack surface analysis is updated when an application's design is altered.
Description

For each software project, create a simplified view of the overall architecture. Typically, this should be created based on project artifacts such as high-level requirements and design documents, interviews with technical staff, or module-level review of the code base. It is important to capture the high-level modules in the system, but a good rule of thumb for granularity is to ensure that the diagram of the whole system under review fits onto one page. From the single page architecture view, analyze each component in terms of accessibility of the interfaces from authorized users, anonymous users, operators, application-specific roles, etc. The components providing the interfaces should also be considered in the context of the one-page view to find points of functional delegation or data pass-through to other com-ponents on the diagram. Group interfaces and components with similar accessibility profiles and capture this as the software attack surface. For each interface, further elaborate the one-page diagram to note any security- related functionality. Based on the identified interface groups comprising the attack surface, check the model for design-level consistency for how interfaces with similar access are secured. Any breaks in consistency can be noted as assessment findings This analysis should be conducted by security-savvy technical staff, either within the project team or external. Typically, after initial creation, the diagram and attack surface analysis only needs to be updated during the design phase when additions or changes are made to the edge system interfaces.

Identify software attack surface
790: Do project teams check software designs against known security risks?
  • Each project group documents a list of assumptions the software relies on for safe execution.
  • Each project group documents a list of security requirements for the application.
  • Each project's one-page architecture diagram is evaluated for security requirements and assumptions. Missing items are documented as findings.
  • Evaluations are repeated when security requirements are added or the high-level system design changes occur within a project.
Description

For each software project, create a simplified view of the overall architecture. Typically, this should be created based on project artifacts such as high-level requirements and design documents, interviews with technical staff, or module-level review of the code base. It is important to capture the high-level modules in the system, but a good rule of thumb for granularity is to ensure that the diagram of the whole system under review fits onto one page. From the single page architecture view, analyze each component in terms of accessibility of the interfaces from authorized users, anonymous users, operators, application-specific roles, etc. The components providing the interfaces should also be considered in the context of the one-page view to find points of functional delegation or data pass-through to other com-ponents on the diagram. Group interfaces and components with similar accessibility profiles and capture this as the software attack surface. For each interface, further elaborate the one-page diagram to note any security- related functionality. Based on the identified interface groups comprising the attack surface, check the model for design-level consistency for how interfaces with similar access are secured. Any breaks in consistency can be noted as assessment findings This analysis should be conducted by security-savvy technical staff, either within the project team or external. Typically, after initial creation, the diagram and attack surface analysis only needs to be updated during the design phase when additions or changes are made to the edge system interfaces.