You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ From a startup to a multinational corporation the software development industry
4
4
5
5
The OWASP DevSecOps Maturity Model provides opportunities to harden DevOps strategies and shows how these can be prioritized.
6
6
7
-
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
7
+
With the help of DevOps strategies security can also be enhanced. For example, each component such as application libraries and operating system libraries in docker images can be tested for known vulnerabilities.
8
8
9
9
Attackers are intelligent and creative, equipped with new technologies and purpose. Under the guidance of the forward-looking DevSecOps Maturity Model, appropriate principles and measures are at hand implemented which counteract the attacks.
10
10
@@ -63,9 +63,9 @@ In case you would like to perform a DevSecOps assessment, the following tools ar
63
63
3. Browse to <http://localhost:8080> (on macOS and Windows browse to <http://192.168.99.100:8080> if you are using docker-machine instead
64
64
of the native docker installation)
65
65
66
-
For customized DSOMM, take a look at https://github.com/wurstbrot/DevSecOps-MaturityModel-custom. In case you would like to have perform an assessment for multiple teams, iterate from port 8080 to 8XXX, depending of the size of your team.
66
+
For customized DSOMM, take a look at https://github.com/wurstbrot/DevSecOps-MaturityModel-custom.
67
67
68
-
You can download your current state from the circular headmap and mount it again via
68
+
You can download your current state from the circular heatmap and mount it again via
69
69
70
70
```bash
71
71
wget https://raw.githubusercontent.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/main/src/assets/YAML/generated/generated.yaml # or go to /circular-heatmap and download edited yaml (bottom right)
@@ -124,10 +124,18 @@ In the corresponding [dimension YAMLs](https://github.com/devsecopsmaturitymodel
124
124
[...]
125
125
teamsImplemented:
126
126
Default: false
127
+
B: true
127
128
C: true
128
-
evidence:
129
-
B: Showed Jenkinsfile
129
+
teamsEvidence:
130
+
B: All team members completed OWASP Secure Coding Dojo training on 2025-01-11.
131
+
C: |
132
+
The pentest report from 2025 has been split into Jira tasks under
Copy file name to clipboardExpand all lines: src/assets/Markdown Files/README.md
+59-41Lines changed: 59 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,24 +10,26 @@ Attackers are intelligent and creative, equipped with new technologies and purpo
10
10
11
11
# Usage
12
12
13
-
Go to https://dsomm.timo-pagel.de or clone [this repository](https://github.com/wurstbrot/DevSecOps-MaturityModel/) and run `startDocker.bash`.
13
+
Go to https://dsomm.owasp.org.
14
14
15
15
*_matrix_ shows the dimensions, subdimensions and activities are described.
16
-
*_Implementation Levels_ can be used to measure the current implementation level by clicking on the specific activities which have been performed.
17
-
*_Ease and Value of Implementation_ is used for the maturity model development to see the ease and value of each activity to be able to compare it with activities within the subdimension and activities from other subdimensions.
18
-
*_Dependenies_ shows the dependencies between activities
19
-
*_Useage_ describes the dimensions
20
-
*_Full Report_ prints all activities to be able to print it
16
+
*_Implementation Levels_ can be used to show the current implementation level by clicking on the specific activities which have been performed (it is recommended to use a gitops-like flow)
17
+
*_Mappings_ Shows mappings to other standards and provides the ability to download an excel sheet
18
+
*_Usage_ describes how to use DSOMM
21
19
22
20
In this [video](https://www.youtube.com/watch?v=tX9RHZ_O5NU) Timo Pagel describes different strategic approaches for your secure DevOps strategy. The use OWASP DSOMM in combination with [OWASP SAMM](https//owaspsamm.org) is explained.
23
21
24
22
In case you have evidence or review questions to gather evidence, you can add the attribute "evidence" to an activity which will be attached to an activity to provide it to your CISO or your customer's CISO.
25
23
You can switch on to show open TODO's for evidence by changing IS_SHOW_EVIDENCE_TODO to true 'bib.php' `define(IS_SHOW_EVIDENCE_TODO, true);`
26
24
27
-
# Community
25
+
This page uses the Browser's localStorage to store the state of the circular headmap.
26
+
27
+
# Changes
28
+
Changes to the application are displayed at the release page of [DevSecOps-MaturityModel](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/releases).
28
29
29
-
Code Freeze: Currently, with the Google Summer student Aryan Prasad we develop a new Angular frontend version, therefore, we do not accept any code changes right now.
30
+
Changes to the maturity model content are displayed at the release page of [DevSecOps-MaturityModel-data](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/releases).
30
31
32
+
# Community
31
33
Join #dsomm in [OWASP Slack](https://owasp.slack.com/join/shared_invite/zt-g398htpy-AZ40HOM1WUOZguJKbblqkw#/).
32
34
Create issues or even better Pull Requests in [github](https://github.com/wurstbrot/DevSecOps-MaturityModel/).
33
35
@@ -57,31 +59,22 @@ In case you would like to perform a DevSecOps assessment, the following tools ar
57
59
## Container
58
60
59
61
1. Install [Docker](https://www.docker.com)
60
-
2. Run `docker run --rm -p 8080:8080 wurstbrot/dsomm:latest`
62
+
2. Run `docker pull wurstbrot/dsomm:latest && docker run --rm -p 8080:8080 wurstbrot/dsomm:latest`
61
63
3. Browse to <http://localhost:8080> (on macOS and Windows browse to <http://192.168.99.100:8080> if you are using docker-machine instead
62
64
of the native docker installation)
63
65
64
-
In case you would like to have perform an assessment for multiple teams, iterate from port 8080 to 8XXX, depending of the size of your team.
65
-
In case the application should be visible, but the "Implementation Level" shouldn't be changeable, consider the following code:
66
+
For customized DSOMM, take a look at https://github.com/wurstbrot/DevSecOps-MaturityModel-custom.
66
67
67
-
```bash
68
-
#!/bin/bash
69
-
set -xe
68
+
You can download your current state from the circular heatmap and mount it again via
cp -a selectedData.csv DevSecOps-MaturityModel/selectedData.csv
77
-
78
-
cd DevSecOps-MaturityModel
79
-
docker build -t $IMAGE_NAME.
80
-
docker push $IMAGE_NAME
70
+
```bash
71
+
wget https://raw.githubusercontent.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/main/src/assets/YAML/generated/generated.yaml # or go to /circular-heatmap and download edited yaml (bottom right)
72
+
docker run -p 8080:8080 -v /tmp/generated.yaml:/srv/assets/YAML/generated/generated.yaml wurstbrot/dsomm:latest
81
73
```
82
74
83
-
This approach also allows teams to perform self assessment with changes tracked in a repository.
75
+
.
84
76
77
+
This approach also allows teams to perform self assessment with changes tracked in a repository.
85
78
86
79
## Amazon EC2 Instance
87
80
@@ -97,29 +90,52 @@ This approach also allows teams to perform self assessment with changes tracked
97
90
98
91
```bash
99
92
#!/bin/bash
100
-
yum update -y
101
-
yum install -y docker
102
93
service docker start
103
-
docker run -d -p 80:80 wurstbrot/dsomm:latest
94
+
docker run -d -p 80:8080 wurstbrot/dsomm:latest
104
95
```
105
96
106
-
## Tests
97
+
## Activity Definitions
98
+
The definition of the activities are in the [data-repository](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data).
107
99
108
-
To run basic tests just
100
+
## Teams and Groups
101
+
To customize these teams, you can create your own [meta.yaml](src/assets/meta.yaml) file with your unique team definitions.
109
102
110
-
```bash
111
-
docker-compose -f docker-compose.dev.yaml up test-php
112
-
```
103
+
Assessments within the framework can be based on either a team or a specific application, which can be referred to as the context. Depending on how you define the context or teams, you may want to group them together.
113
104
114
-
# Credits
105
+
Here are a couple of examples to illustrate this, in breakers the DSOMM word:
106
+
- Multiple applications (teams) can belong to a single overarching team (application).
107
+
- Multiple teams (teams) can belong to a larger department (group).
115
108
116
-
* The dimension _Test and Verification_ is based on Christian Schneiders [Security DevOps Maturity Model (SDOMM)](https://www.christian-schneider.net/SecurityDevOpsMaturityModel.html). _Application tests_ and _Infrastructure tests_ are added by Timo Pagel. Also, the sub-dimension _Static depth_ has been evaluated by security experts at [OWASP Stammtisch Hamburg](https://www.owasp.org/index.php/OWASP_German_Chapter_Stammtisch_Initiative/Hamburg).
117
-
* The sub-dimension <i>Process</i> has been added after a discussion with [Francois Raynaud](https://www.linkedin.com/in/francoisraynaud/) that reactive activities are missing.
118
-
* Enhancement of my basic translation is performed by [Claud Camerino](https://github.com/clazba).
119
-
* Adding ISO 27001:2017 mapping, [Andre Baumeier](https://github.com/AndreBaumeier).
120
-
* Providing a documentation of how to use `docker` in the Juice Shop for simple copy&paste, [Björn Kimminich](https://github.com/bkimminich/).
121
-
*[OWASP Project Integration Project Writeup](https://github.com/OWASP/www-project-integration-standards/blob/master/writeups/owasp_in_sdlc/index.md) for providing documentation on different DevSecOps practices which are copied&pasted/ (and adopted) (https://github.com/northdpole, https://github.com/ThunderSon)
122
-
* The requirements from [level 0](https://github.com/AppSecure-nrw/security-belts/blob/master/white/) are based on/copied from [AppSecure NRW](https://appsecure.nrw/)
109
+
Feel free to create your own [meta.yaml](src/assets/meta.yaml) file to tailor the framework to your specific needs and mount it in your environment (e.g. kubernetes or docker).
110
+
Here is an example to start docker with customized meta.yaml:
111
+
```
112
+
# Customized meta.yaml
113
+
cp src/assets/YAML/meta.yaml .
114
+
docker run -v $(pwd)/meta.yaml:/srv/assets/YAML/meta.yaml -p 8080:8080 wurstbrot/dsomm
If you are using the model or you are inspired by it, want to help but don't want to create pull requests? You can donate at the [OWASP Project Wiki Page](https://owasp.org/donate/?reponame=www-project-devsecops-maturity-model&title=OWASP+Devsecops+Maturity+Model). Donations might be used for the design of logos/images/design or travels.
0 commit comments