Replies: 4 comments 9 replies
-
@tghosth, to help kickoff the discussion for the community, maybe I just want to clarify that by this statement above do you mean practicality of ease of implementing a particular requirement? If yes, then I would agree with that for defining the levels of requirements with L1 being easiest and quick to implement, followed by L2 for wider protection and L3 for defense in depth protections. |
Beta Was this translation helpful? Give feedback.
-
I’d like to suggest that we stick only two levels like MASVS.
Level 1 - Requirements that every app must follow
If they use that type of tech.
Level 2 - Requirements for high risk apps like critical infrastructure, if they tech applies.
This is a pure risk based approach. It would simplify the levels.
AppSec is hard. The beauty of ASVS is its thoroughness. Now that we have many folks who care about ASVS we can drop level 1 since it’s really only a “best effort” and not a complete approach.
I feel that “difficulty of testing or developing” a certain issue is relevant but only as metadata, not as a driver for “what must be done”.
|
Beta Was this translation helpful? Give feedback.
-
However many we will have those levels, the most important thing is that we must be able to provide a "flowchart" or a "decision tree" to decide, which requirement belongs to which level. For (really simplified) example:
|
Beta Was this translation helpful? Give feedback.
-
Is there any wisdom to snapping the levels to NIST's aal1, aal2, aal3? Very similar to @tghosth proposal but L1 would likely be a little more loose |
Beta Was this translation helpful? Give feedback.
-
Guidelines for new definitions
It has been widely discussed that we don’t want to focus on the “pentestable” concept for 5.0. See: #1495 (comment)
We talk about the current levels being “risk based” but practically the actual definitions currently seem to be something like this:
I think that levels based on the types of requirements makes sense and we just need to be clearer about this.
Alongside this, I think we should consider the levels more around practicality than risk and leave it to users to decide which level is correct for them.
Proposed Levels
Level 1 - Common Protections
These are the minimum security requirements that an application should have in place to prevent common attacks.
We would prioritise them as “common” based on our industry view of what types of attacks are most common or likely. We could also reference the OWASP Top 10 data sets for this.
Some example requirements that I think would fit this definition:
Level 2 - Wider Protections
This adds additional requirements to provide against a wider range of attacks which might be less common, based on the above assessment.
Some example requirements that I think would fit this definition:
Level 3 - Comprehensive Defense with Depth
This adds the remaining requirements to provide either more complex protection mechanisms or mechanisms that are more like defense in depth.
Some example requirements that I think would fit this definition:
Call to Action
What do people think about these definitions? I would welcome any input although I don't want to argue about specific requirements from the examples above but rather just the definitions themselves.
Beta Was this translation helpful? Give feedback.
All reactions