SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Derive test cases from known security requirements
802: Do projects specify security testing based on defined security requirements?
  • The organization has documented general test cases based on security requirements and common vulnerabilities.
  • Each project has documented test cases for security requirements specific to that project.
  • Staff ensures test cases are applicable, feasible, and can be executed by relevant development, security, and quality assurance staff.
Description

From the known security requirements for a project, identify a set of test cases to check the software for correct functionality. Typically, these test cases are derived from security concerns surrounding the functional requirements and business logic of the system, but should also include generic tests for common vulnerabilities based on the implementation language or technology stack. Often, it is most effective to use the project team’s time to build application-specific test cases and utilize publicly available resources or purchased knowledge bases to select applicable general test cases for security. Although not required, automated security testing tools can also be utilized to cover the general security test cases. This test case planning should occur during the requirements and/or design phases, but must occur before final testing prior to release. Candidate test cases should be reviewed for applicability, efficacy, and feasibility by relevant development, security, and quality assurance staff.

Derive test cases from known security requirements
802: Is penetration testing performed on high risk projects prior to release?
  • Project teams engage security auditors to perform penetration testing.
  • Penetration testing covers security requirements and test cases at a minimum.
  • Penetration testing issues are resolved to an acceptable level of risk prior to release.
Description

From the known security requirements for a project, identify a set of test cases to check the software for correct functionality. Typically, these test cases are derived from security concerns surrounding the functional requirements and business logic of the system, but should also include generic tests for common vulnerabilities based on the implementation language or technology stack. Often, it is most effective to use the project team’s time to build application-specific test cases and utilize publicly available resources or purchased knowledge bases to select applicable general test cases for security. Although not required, automated security testing tools can also be utilized to cover the general security test cases. This test case planning should occur during the requirements and/or design phases, but must occur before final testing prior to release. Candidate test cases should be reviewed for applicability, efficacy, and feasibility by relevant development, security, and quality assurance staff.

Derive test cases from known security requirements
802: Are stakeholders aware of the security test status prior to release?
  • Penetration testing issues are reviewed with project stakeholders.
  • Project stakeholders select issues to remediate prior to release.
  • Project stakeholders set a time line for addressing identified issues or accept outstanding risks.
Description

From the known security requirements for a project, identify a set of test cases to check the software for correct functionality. Typically, these test cases are derived from security concerns surrounding the functional requirements and business logic of the system, but should also include generic tests for common vulnerabilities based on the implementation language or technology stack. Often, it is most effective to use the project team’s time to build application-specific test cases and utilize publicly available resources or purchased knowledge bases to select applicable general test cases for security. Although not required, automated security testing tools can also be utilized to cover the general security test cases. This test case planning should occur during the requirements and/or design phases, but must occur before final testing prior to release. Candidate test cases should be reviewed for applicability, efficacy, and feasibility by relevant development, security, and quality assurance staff.