SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Train all stakeholders for awareness
G-EG-A-1: Do you require employees involved with application development to take SDLC training?
  • Training is repeatable, consistent, and available to anyone involved with software development lifecycle
  • Training includes relevant content from the latest OWASP Top 10 and includes concepts such as Least Privilege, Defense-in-Depth, Fail Secure (Safe), Complete Mediation, Session Management, Open Design, and Psychological Acceptability
  • Training requires a sign-off or an acknowledgement from attendees
  • You have reviewed the training content within the last 12 months, and have completed any required updates
  • All new covered staff are required to complete training during their onboarding process
  • Existing covered staff are required to complete training when content is added/revised, or complete refresher training at least every 24 months, whichever comes first
Coverage
Description

Benefit

Basic security awareness for all relevant employees

Activity

Conduct security awareness training for all roles currently involved in the management, development, testing, or auditing of the software. The goal is to increase the awareness of application security threats and risks, security best practices, and secure software design principles. Develop training internally or procure it externally. Ideally, deliver training in person so participants can have discussions as a team, but Computer-Based Training (CBT) is also an option.

Course content should include a range of topics relevant to application security and privacy, while remaining accessible to a non-technical audience. Suitable concepts are secure design principles including Least Privilege, Defense-in-Depth, Fail Secure (Safe), Complete Mediation, Session Management, Open Design, and Psychological Acceptability. Additionally, the training should include references to any organization-wide standards, policies, and procedures defined to improve application security. The OWASP Top 10 vulnerabilities should be covered at a high level.

Training is mandatory for all employees and contractors involved with software development and includes an auditable sign-off to demonstrate compliance. Consider incorporating innovative ways of delivery (such as gamification) to maximize its effectiveness and combat desensitization.

Recommended vendor for Training and Awareness
Secure Code Warrior logo

Secure Code Warrior’s platform offers interactive, gamified training that makes learning engaging and effective. Developers can participate in hands-on coding challenges, tournaments, and real-time coaching, all tailored to their preferred programming languages and frameworks. This personalized and enjoyable learning experience fosters a culture of security-conscious developers who are empowered to write secure code from the start, reducing vulnerabilities and enhancing overall software quality.

Why we like Secure Code Warrior: We love Secure Code Warrior for its unmatched breadth of content, covering every coding language you can think of and more. What truly sets it apart is its metric-driven approach to learning, featuring benchmark scores that let you compare your organization’s performance to others. Secure Code Warrior not only equips teams with essential secure coding skills but also provides the insights needed to track and improve proficiency over time.

Find out more.

OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Community guidance

This guidance is based on the approved community submissions.