Delivery Maturity

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 39 minutes
Difficulty
Beginner
CEU/CPE
5
Video Transcription
00:00
here we are at less than 5.7. We're going talk about delivery maturity specific to the old WASP maturity model.
00:07
We're gonna take a look at it and mention the maturity model for for delivery
00:12
and look a test verification specifically and discuss some of the application test.
00:20
So there's as I mentioned before, we just kind of reiterate there's four different levels for maturity. We're gonna take a look at test verification dimension for this, since at that phase we're in
00:30
and look at the specific sub dimensions for application tests and then dynamic application scanning
00:39
for testing. Verification. The maturity model doesn't have anything listed for the basic Level one, but for Level two, they should said you should be doing security tests for some of your important components. As you get to the next level, do some integration tests for the same components,
00:55
and then, as you get to the higher level, you should be doing high coverage of all security related modules. All your integration tests. You should be doing smoke tests as well, to just really mature your application testing
01:10
and then for the sub. There's another sub dimension here for the dynamic testing where at level one you just be doing the simple scan for as you get to the next level, you should be doing client side dynamic components and then using different roles, kind of mentioned about defining the business logic failures
01:26
that would be specific to a role that you're not going to see when you're doing
01:30
regular Dass scanning because they're looking for patterns, not business rules.
01:37
A quick check here.
01:38
Do you see what are the benefits for using multiple scanners?
01:46
So each scanner has a different strengths and weaknesses. We actually I showed this in in the demo where we compared the results of the S E A. From OAS tool in the essay from the I asked toward found some the delta between the two, so they may not speak specific to the strength of the weaknesses, but they just
02:02
have to do with their ability to find whatever use patterns that use whatever source data they're using to find vulnerabilities.
02:10
And I said multiple scanners can cover the gaps, and Andy, the combination of the two can give you a better sense of just drilling down and really finding everyone of the vulnerabilities that are out there are giving you a better coverage
02:23
and needed. But you really gonna need to balance the price. So especially if you're not using,
02:30
um, open source tools. If you actually paying for the tools,
02:34
you're gonna want to know our how much budget you have and balance this. Is it worth the money I'm gonna put out there to find the small gaps? Or that might be during the testing phase where you actually test different applications or scanners. See what what value you're getting from them
02:53
for the dynamic depth were just falling back on level three, you'd be covering some of the more hidden components input vectors, looking at sequential operation and again actually implementing multiple scanners like we just talked about.
03:07
And as you get to the highest level, you be looking for a lot more coverage analysis, especially if you're running containers with micro services. You be stuck. Your start looking at service the surface communication as well toe Identify any vulnerabilities within that what we would think of maybe as a quote unquote trusted arena, you're going to want to look at that.
03:28
We looked at the maturing our def SEC ops pipeline specific to the ah, loss. Ma jewel
03:34
in this. Sorry the model. And in the next lesson, we're gonna wrap up because we've reached the end of the module.
Up Next