You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,14 +10,12 @@ Attackers are intelligent and creative, equipped with new technologies and purpo
10
10
11
11
# Usage
12
12
13
-
Go to https://dsomm.timo-pagel.de.
13
+
Go to https://dsomm.owasp.org.
14
14
15
15
*_matrix_ shows the dimensions, subdimensions and activities are described.
16
-
*_Implementation Levels_ can be used to measure the current implementation level by clicking on the specific activities which have been performed.
17
-
*_Ease and Value of Implementation_ is used for the maturity model development to see the ease and value of each activity to be able to compare it with activities within the subdimension and activities from other subdimensions.
18
-
*_Dependenies_ shows the dependencies between activities
19
-
*_Useage_ describes the dimensions
20
-
*_Full Report_ prints all activities to be able to print it
16
+
*_Implementation Levels_ can be used to show the current implementation level by clicking on the specific activities which have been performed (it is recommended to use a gitops-like flow)
17
+
*_Mappings_ Shows mappings to other standards and provides the ability to download an excel sheet
18
+
*_Useage_ describes how to use DSOMM
21
19
22
20
In this [video](https://www.youtube.com/watch?v=tX9RHZ_O5NU) Timo Pagel describes different strategic approaches for your secure DevOps strategy. The use OWASP DSOMM in combination with [OWASP SAMM](https//owaspsamm.org) is explained.
0 commit comments