SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Define basic defect metrics
I-DM-B-1: Do you use basic metrics about recorded security defects to carry out quick win improvement activities?
  • You analyzed your recorded metrics at least once in the last year
  • At least basic information about this initiative is recorded and available
  • You have identified and carried out at least one quick win activity based on the data
Coverage
- None: There is no coverage for this activity or not all quality criteria have been fulfilled.
- Some: You perform this activity across some portion of your applications, to a certain extend, or review it on an ad-hoc basis, while making sure that all quality criteria are fulfilled.
- Half: You perform this activity across half of your applications, to a larger extent or review it at regular times (though not very often), while making sure that all quality criteria are fulfilled.
- Most/All: You perform this activity across most / all of your applications, to a full extent or review it at regular times at most once a year, while making sure that all quality criteria are fulfilled.
Description

Once per defined period of time (typically at least once per year), go over your both resolved and still open recorded security defects in every team and extract basic metrics from the available data. These might include:

  • The total number of defects versus total number of verification activities. This could give you an idea whether you're looking for defects with an adequate intensity and quality.
  • The software components the defects reside in. This is indicative of where attention might be most required, and where security flaws might be more likely to appear in the future again.
  • The type or category of the defect, which suggests areas where the development team need further training.
  • The severity of the defect, which can help the team understand the software's risk exposure.

Identify and carry out sensible quick win activities which you can derive from the newly acquired knowledge. These might include things like a knowledge sharing session about one particular vulnerability type or carrying out / automating a security scan.

Endorsed Solutions for Mastering Metrics and Feedback
vendor logo Become a Recommended Vendor for Metrics and Feedback!

Are you a provider of cutting-edge products, processes, consultancy, or technology that aligns with Metrics and Feedback? Showcase your expertise and connect with organizations seeking solutions like yours. Apply now to become an endorsed vendor and help others achieve mastery!

Do you want to recommend a vendor to appear here? Recommend a vendor
OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Loading...
Loading, please wait.
Community guidance

This guidance is based on the approved community submissions.

Loading...
Loading, please wait.
Open CRE
Loading...
Loading, please wait.