Title: Appendix D: OWASP SAMM 2.0 Mapping  
Owner: Matthias Rohr
Creator: Matthias Rohr Mar 31, 2020
Last Changed by: Matthias Rohr Sept 10, 2020
Tiny Link: (useful for email) https://secodis.atlassian.net/wiki/x/AQDKEw
Export As: Word · PDF  
Labels
Global Labels (1)
Page Permissions
Page restrictions:
  • Only Matthias Rohr can edit this page. (set by Matthias Rohr at Mar 31, 2020 11:07)
Outgoing Links
External Links (43)
    https://owaspsamm.org/model/governance/strategy-and-metrics
    https://owaspsamm.org/model/design/threat-assessment/stream…
    https://owaspsamm.org/model/design/threat-assessment/stream…
    https://owaspsamm.org/model/design/security-requirements/st…
    https://owaspsamm.org/model/implementation/secure-build/str…
    https://owaspsamm.org/model/operations/operational-manageme…
    https://owaspsamm.org/model/verification/security-testing/s…
    https://owaspsamm.org/model/verification/architecture-asses…
    https://owaspsamm.org/model/verification/security-testing/s…
    https://owaspsamm.org/model/governance/policy-and-complianc…
    https://owaspsamm.org/model/design/threat-assessment
    https://owaspsamm.org/model/governance/education-and-guidan…
    https://owaspsamm.org/model/design/security-architecture/st…
    https://owaspsamm.org/model/operations/operational-manageme…
    https://secodis.atlassian.net/wiki/spaces/TSSWEB/pages/3277…
    https://owaspsamm.org/model/governance/policy-and-complianc…
    https://owaspsamm.org/model/operations/operational-manageme…
    https://owaspsamm.org/model/implementation/secure-build/str…
    https://owaspsamm.org/model/design/security-requirements
    https://owaspsamm.org/model/implementation/secure-build
    https://owaspsamm.org/model/implementation/secure-deploymen…
    https://owaspsamm.org/model/governance/policy-and-complianc…
    https://owaspsamm.org/model/operations/incident-management
    https://owaspsamm.org/model/implementation/defect-managemen…
    https://owaspsamm.org/model/implementation/defect-managemen…
    https://owaspsamm.org/model/governance/education-and-guidan…
    https://owaspsamm.org/model/verification/requirements-drive…
    https://owaspsamm.org/model/verification/requirements-drive…
    https://owaspsamm.org/model/operations/environment-manageme…
    https://owaspsamm.org/model/design/security-architecture/st…
    https://owaspsamm.org/model/verification/security-testing
    https://owaspsamm.org/model/verification/architecture-asses…
    https://owaspsamm.org/model/verification/architecture-asses…
    https://owaspsamm.org/model/verification/requirements-drive…
    https://owaspsamm.org/model/operations/environment-manageme…
    https://owaspsamm.org/model/implementation/defect-managemen…
    https://owaspsamm.org/model/operations/environment-manageme…
    https://owaspsamm.org
    https://owaspsamm.org/model/operations/incident-management/…
    https://owaspsamm.org/model/implementation/secure-deploymen…
    https://owaspsamm.org/model/operations/incident-management/…
    https://owaspsamm.org/model/design/security-architecture
    https://owaspsamm.org/model/implementation/secure-deploymen…
TSS-WEB (10)     Page: 6. Security Tests
    Page: 5. Security within Software Development Process
    Page: 4. Secure Development Environment
    Page: 8.11 Protection of Secrets
    Page: 8. Implementation Requirements
    Page: 8.10 Data Security & Cryptography
    Page: 7. Outsourced Development
    Page: 8.9 Error Handling & Logging
    Page: 3. Secure Operation
    Page: 1.4 Roles