diff --git a/data/CultureandOrg.yml b/data/CultureandOrg.yml index 4aa4ee123..5c51c6979 100755 --- a/data/CultureandOrg.yml +++ b/data/CultureandOrg.yml @@ -1,5 +1,30 @@ --- Education and Guidance: + Ad-Hoc Security trainings for software developers: + risk: Understanding security is hard and personnel needs to be trained on it. Otherwise, flaws like an SQL Injection might be introduced into the software which might get exploited. + measure: Provide security awareness training for all personnel involved in software development Ad-Hoc. + difficultyOfImplementation: + knowledge: 2 + time: 1 + resources: 1 + usefulness: 3 + level: 1 + samm: EG1-A + - In case you do not have the budget to hire an external security expert, an option is to use the OWASP Juice Shop on a "hacking Friday" + - https://cheatsheetseries.owasp.org/ + Regular security training for all: + risk: Understanding security is hard. + measure: Provide security awareness training for all personnel involved in software development on a regular basis like twice in a year for 1-3 days. + difficultyOfImplementation: + knowledge: 2 + time: 2 + resources: 1 + usefulness: 3 + level: 2 + samm: EG1-A + implementation: + - In case you do not have the budget to hire an external security expert, an option is to use the OWASP Juice Shop on a "hacking Friday" + - https://cheatsheetseries.owasp.org/ Security consulting on request: risk: Not asking a security expert when questions regarding security appear might lead to flaws. measure: Security consulting to teams is given on request. The security consultants can be internal or external.