SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Track security defects centrally
I-DM-A-1: Do you track all known security defects in accessible locations?
  • You can easily get an overview of all security defects impacting one application
  • You have at least a rudimentary classification scheme in place
  • The process includes a strategy for handling false positives and duplicate entries
  • The defect management system covers defects from various sources and activities
Coverage
- None: There is no coverage for this activity or not all quality criteria have been fulfilled.
- Some: You perform this activity across some portion of your applications, to a certain extend, or review it on an ad-hoc basis, while making sure that all quality criteria are fulfilled.
- Half: You perform this activity across half of your applications, to a larger extent or review it at regular times (though not very often), while making sure that all quality criteria are fulfilled.
- Most/All: You perform this activity across most / all of your applications, to a full extent or review it at regular times at most once a year, while making sure that all quality criteria are fulfilled.
Description

Introduce a common definition / understanding of a security defect and define the most common ways of identifying these. These typically include, but are not limited to:

  • Threat assessments
  • Penetration tests
  • Output from static and dynamic analysis scanning tools
  • Responsible disclosure processes or bug bounties

Foster a culture of transparency and avoid blaming any teams for introducing or identifying security defects. Record and track all security defects in a defined location. This location doesn't necessarily have to be centralized for the whole organization, however ensure that you're able to get an overview of all defects affecting a particular application at any single point in time. Define and apply access rules for the tracked security defects to mitigate the risk of leakage and abuse of this information.

Introduce at least rudimentary qualitative classificiation of security defects so that you are able to prioritize fixing efforts accordingly. Strive for limiting duplication of information and presence of false positives to increase the trustworthiness of the process.

Recommended vendor for Defect Tracking
DefectDojo logo

DefectDojo is the only open source unified vulnerability management platform built by security professionals for security professionals. Manage all the data from all your security tools for a single source of truth that streamlines prioritization, remediation, and reporting. Make security scalable with intelligent vulnerability management that delivers automation to provide complete vulnerability visibility, deliver accurate results and reduce risk.

Why we like DefectDojo: We love DefectDojo because it streamlines defect management into a single, efficient tool. Its strong focus on metrics and a metric-driven approach to application security makes it a perfect match for organizations adopting SAMM. By treating metrics as first-class citizens, DefectDojo empowers teams to track progress, prioritize effectively, and drive continuous improvement in their security programs.

Find out more about DefectDojo

OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Loading...
Loading, please wait.
Community guidance

This guidance is based on the approved community submissions.

Loading...
Loading, please wait.