SAMM Spreadsheet
SAMM Spreadsheet
Version: 2.0
Description: Our mission is to provide an effective and measurable way for all types of organizations to analyze and improve their
software security posture. We want to raise awareness and educate organizations on how to design, develop, and deploy
secure software through our self-assessment model.
SAMM The Software Assurance Maturity Model (SAMM) was created by Pravir Chandra and is now an Open Web Application
Security Project (OWASP) project.
SAMM is licensed under the Creative Commons Attribution-Share Alike 4.0 License
https://owaspsamm.org/
SAMM Assessment Interview: For
Instructions
Interview an individual based on the questions below organized according to SAMM Business Functions and Security Practices.
Select the best answer from the multiple choice drop down selections in the answer column.
Document additional information such as how and why in the "Interview Notes" column.
The formulas in hidden columns F-H will calculate the scores and update the Rating boxes and other worksheets as needed.
Once the interview is complete, go to the "Scorecard" sheet and follow instructions.
Organization:
Team/Application:
Interview Date:
Team Lead:
Contributors:
Governance
Stream Level Strategy & Metrics Answer Interview Notes Rating
1 Do you understand the enterprise-wide risk appetite for your applications?
You capture the risk appetite of your organization's executive leadership
The organization's leadership vet and approve the set of risks
You identify the main business and technical threats to your assets and data 0.00
You document risks and store them in an accessible location
2 Do you have a strategic plan for application security and use it to make decisions?
The plan reflects the organization's business priorities and risk appetite
The plan includes measurable milestones and a budget
Create and The plan is consistent with the organization's business drivers and risks
Promote The plan lays out a roadmap for strategic and tactical initiatives
You have buy-in from stakeholders, including development teams
3 Do you regularly review and update the Strategic Plan for Application Security?
You review and update the plan in response to significant changes in the business environment, the organization, or its risk appetite
Plan update steps include reviewing the plan with all the stakeholders and updating the business drivers and strategies
You adjust the plan and roadmap based on lessons learned from completed roadmap activities
You publish progress information on roadmap activities, making sure they are available to all stakeholders
Do you use a set of metrics to measure the effectiveness and efficiency of the application security program across
1 applications?
You document each metric, including a description of the sources, measurement coverage, and guidance on how to use it to explain
application security trends
Metrics include measures of efforts, results, and the environment measurement categories
Most of the metrics are frequently measured, easy or inexpensive to gather, and expressed as a cardinal number or a percentage
Application security and development teams publish metrics
Measure and 2 Did you define Key Performance Indicators (KPI) from available application security metrics?
Improve You defined KPIs after gathering enough information to establish realistic objectives
You developed KPIs with the buy-in from the leadership and teams responsible for application security
KPIs are available to the application teams and include acceptability thresholds and guidance in case teams need to take action
Success of the application security program is clearly visible based on defined KPIs
3 Do you update the Application Security strategy and roadmap based on application security metrics and KPIs?
You review KPIs at least yearly for their efficiency and effectiveness
KPIs and application security metrics trigger most of the changes to the application security strategy
Do you regularly report on policy and standard compliance, and use that information to guide compliance improvement
3 efforts?
You have procedures (automated, if possible) to regularly generate compliance reports
You deliver compliance reports to all relevant stakeholders
Stakeholders use the reported compliance status information to identify areas for improvement
Do you have a standard set of security requirements and verification procedures addressing the organization's external
2 compliance obligations?
Compliance You map each external compliance obligation to a well-defined set of application requirements
Management You define verification procedures, including automated tests, to verify compliance with compliance-related requirements
Do you regularly report on adherence to external compliance obligations and use that information to guide efforts to close
3 compliance gaps?
You have established, well-defined compliance metrics
You measure and report on applications' compliance metrics regularly
Stakeholders use the reported compliance status information to identify compliance gaps and prioritize gap remediation efforts
2 Is training customized for individual roles such as developers, testers, or security champions?
Training includes all topics from maturity level 1, and adds more specific tools, techniques, and demonstrations
Training and
Training is mandatory for all employees and contractors
Awareness
Training includes input from in-house SMEs and trainees
Training includes demonstrations of tools and techniques developed in-house
You use feedback to enhance and make future training more relevant
Have you implemented a Learning Management System or equivalent to track employee training and certification
3 processes?
A Learning Management System (LMS) is used to track trainings and certifications
Training is based on internal standards, policies, and procedures
You use certification programs or attendance records to determine access to development systems and resources
Design
Threat Assessment Answer Interview Notes Rating
1 Do you classify applications according to business risk based on a simple and predefined set of questions?
An agreed-upon risk classification exists
The application team understands the risk classification
The risk classification covers critical aspects of business risks the organization is facing 0.00
The organization has an inventory for the applications in scope
2 Do you use centralized and quantified application risk profiles to evaluate business risk?
Application The application risk profile is in line with the organizational risk standard
Risk Profile The application risk profile covers impact to security and privacy
You validate the quality of the risk profile manually and/or automatically
The application risk profiles are stored in a central inventory
3 Do you regularly review and update the risk profiles for your applications?
The organizational risk standard considers historical feedback to improve the evaluation method
Significant changes in the application or business context trigger a review of the relevant risk profiles
1 Do you identify and manage architectural design flaws with threat modeling?
You perform threat modeling for high-risk applications
You use simple threat checklists, such as STRIDE
You persist the outcome of a threat model for later use
2 Do you use a standard methodology, aligned on your application risk levels?
You train your architects, security champions, and other stakeholders on how to do practical threat modeling
Your threat modeling methodology includes at least diagramming, threat identification, design flaw mitigations, and how to validate
Threat Modeling your threat model artifacts
Changes in the application or business context trigger a review of the relevant threat models
You capture the threat modeling artifacts with tools that are used by your application teams
3 Do you regularly review and update the threat modeling methodology for your applications?
The threat model methodology considers historical feedback for improvement
You regularly (e.g., yearly) review the existing threat models to verify that no new threats are relevant for your applications
You automate parts of your threat modeling process with threat modeling tools
Security Requirements Answer Interview Notes Rating
1 Do project teams specify security requirements during development?
Teams derive security requirements from functional requirements and customer or organization concerns
Security requirements are specific, measurable, and reasonable
Security requirements are in line with the organizational baseline
0.00
2 Do you define, structure, and include prioritization in the artifacts of the security requirements gathering process?
Security requirements take into consideration domain specific knowledge when applying policies and guidance to product
Software development
Requirements Domain experts are involved in the requirements definition process
You have an agreed upon structured notation for security requirements
Development teams have a security champion dedicated to reviewing security requirements and outcomes
3 Do you use a standard requirements framework to streamline the elicitation of security requirements?
A security requirements framework is available for project teams
The framework is categorized by common requirements and standards-based requirements
The framework gives clear guidance on the quality of requirements and how to describe them
The framework is adaptable to specific business requirements
Do vendors meet the security responsibilities and quality measures of service level agreements defined by the organization?
2
You discuss security requirements with the vendor when creating vendor agreements
Vendor agreements provide specific guidance on security defect remediation within an agreed upon timeframe
The organization has a templated agreement of responsibilities and service levels for key vendor security processes
You measure key performance indicators
Supplier
Security
Are vendors aligned with standard security controls and software development tools and processes that the organization
3 utilizes?
The vendor has a secure SDLC that includes secure build, secure deployment, defect management, and incident management that
align with those used in your organization
You verify the solution meets quality and security objectives before every major release
When standard verification processes are not available, you use compensating controls such as software composition analysis and
independent penetration testing
1 Do you evaluate the security quality of important technologies used for development?
You have a list of the most important technologies used in, or in support of, each application
You identify and track technological risks
You ensure the risks to these technologies are in line with the organizational baseline
2 Do you have a list of recommended technologies for the organization?
The list is based on technologies used in the software portfolio
Technology Lead architects and developers review and approve the list
Management You share the list across the organization
You review and update the list at least yearly
1 Do you limit access to application secrets according to the least privilege principle?
You store production secrets protected in a secured location
Developers do not have access to production secrets
Production secrets are not available in non-production environments
2 Do you inject production secrets into configuration files during deployment?
Secret Source code files no longer contain active application secrets
Management Under normal circumstances, no humans access secrets during deployment procedures
You log and alert when abnormal secrets access is attempted
3 Do you practice proper lifecycle management for application secrets?
You generate and synchronize secrets using a vetted solution
Secrets are different between different application instances
Secrets are regularly updated
Defect Management Answer Interview Notes Rating
1 Do you track all known security defects in accessible locations?
You can easily get an overview of all security defects impacting one application
You have at least a rudimentary classification scheme in place
The process includes a strategy for handling false positives and duplicate entries 0.00
The defect management system covers defects from various sources and activities
2 Do you keep an overview of the state of security defects across the organization?
Defect Tracking
A single severity scheme is applied to all defects across the organization
The scheme includes SLAs for fixing particular severity classes
You regularly report compliance to SLAs
3 Do you enforce SLAs for fixing security defects?
You automatically alert of SLA breaches and transfer respective defects to the risk management process
You integrate relevant tooling (e.g. monitoring, build, deployment) with the defect management system
1 Do you use basic metrics about recorded security defects to carry out quick win improvement activities?
You analyzed your recorded metrics at least once in the last year
At least basic information about this initiative is recorded and available
You have identified and carried out at least one quick win activity based on the data
2 Do you improve your security assurance program upon standardized metrics?
You document metrics for defect classification and categorization and keep them up to date
Metrics and Executive management regularly receives information about defects and has acted upon it in the last year
Feedback You regularly share technical details about security defects among teams
3 Do you regularly evaluate the effectiveness of your security metrics so that its input helps drive your security strategy?
You have analyzed the effectiveness of the security metrics at least once in the last year
Where possible, you verify the correctness of the data automatically
The metrics is aggregated with other sources like threat intelligence or incident management
You derived at least one strategic activity from the metrics in the last year
Verification
Architecture Assessment Answer Interview Notes Rating
1 Do you review the application architecture for key security objectives on an ad-hoc basis?
You have an agreed upon model of the overall software architecture
You include components, interfaces, and integrations in the architecture model
You verify the correct provision of general security mechanisms 0.00
You log missing security controls as defects
1 Do you review the application architecture for mitigations of typical threats on an ad-hoc basis?
You have an agreed upon model of the overall software architecture
Security savvy staff conduct the review
You consider different types of threats, including insider and data-related ones
2 Do you regularly evaluate the threats to your architecture?
You systematically review each threat identified in the Threat Assessment
Architecture Trained or experienced people lead review exercise
Mitigation You identify mitigating design-level features for each identified threat
You log unhandled threats as defects
3 Do you regularly update your reference architectures based on architecture assessment findings?
You assess your architectures in a standardized, documented manner
You use recurring findings to trigger a review of reference architectures
You independently review the quality of the architecture assessments on an ad-hoc basis
You use reference architecture updates to trigger reviews of relevant shared solutions, in a risk-based manner
3 Do you use the results of security testing to improve the development lifecycle?
You use results from other security activities to improve integrated security testing during development
You review test results and incorporate them into security awareness training and security testing playbooks
Stakeholders review the test results and handle them in accordance with the organization's risk management
Operations
Incident Management Answer Interview Notes Rating
1 Do you analyze log data for security incidents periodically?
You have a contact point for the creation of security incidents
You analyze data in accordance with the log data retention periods
The frequency of this analysis is aligned with the criticality of your applications
0.00
2 Do you follow a documented process for incident detection?
The process has a dedicated owner
Incident You store process documentation in an accessible location
Detection The process considers an escalation path for further analysis
You train employees responsible for incident detection in this process
You have a checklist of potential attacks to simplify incident detection
You have identified the key components in each technology stack used 0.00
You have an established configuration standard for each key component
2 Do you have hardening baselines for your components?
You have assigned an owner for each baseline
Configuration The owner keeps their assigned baselines up to date
Hardening You store baselines in an accessible location
You train employees responsible for configurations in these baselines
3 Do you regularly review and update the data catalog and your data protection policies and procedures?
You have automated monitoring to detect attempted or actual violations of the Data Protection Policy
You have tools for data loss prevention, access control and tracking, or anomalous behavior detection
You periodically audit the operation of automated mechanisms, including backups and record deletions
1 Do you identify and remove systems, applications, application dependencies, or services that are no longer used, have
reached end of life, or are no longer actively developed or supported?
You do not use unsupported applications or dependencies
You manage customer/user migration from older versions for each product and customer/user group
2 Do you follow an established process for removing all associated resources, as part of decommissioning of unused
systems, applications, application dependencies, or services?
System
Decommissioni You document the status of support for all released versions of your products, in an accessible location
ng / Legacy The process includes replacement or upgrade of third-party applications, or application dependencies, that have reached end of life
Management Operating environments do not contain orphaned accounts, firewall rules, or other configuration artifacts
3 Do you regularly evaluate the lifecycle state and support status of every software asset and underlying infrastructure
component, and estimate their end of life?
Your end of life management process is agreed upon
You inform customers and user groups of product timelines to prevent disruption of service or support
You review the process at least annually
SAMM Assessment Scorecard: For
Notes:
Data in this worksheet is automatically imported from the Interview and Roadmap worksheets and will automatically update when
changed in the respective worksheets. This is mostly a read-only worksheet, changes should be made in Interview or Roadmap
worksheets.
Organization:
Team/Application:
Interview Date:
Team Lead:
Contributors:
Governance Policy & Compliance 0.00 0.00 0.00 0.00 Design 0.00 Governance Policy & Compliance 0.00 0.00 0.00 0.00 0.00
Governance Education & Guidance 0.00 0.00 0.00 0.00 Implementation 0.00 Governance Education & Guidance 0.00 0.00 0.00 0.00 0.00
Strategy & Metrics
Design Threat Assessment 0.00 0.00 0.00 0.00 Verification 0.00 Operational Management Policy & Compliance Design Threat Assessment 0.00 0.00 0.00 0.00 0.00
3.00
Design Security Requirements 0.00 0.00 0.00 0.00 Operations 0.00 Environment Management Education & Guidance Design Security Requirements 0.00 0.00 0.00 0.00 0.00
Design Secure Architecture 0.00 0.00 0.00 0.00 Overall 0.00 Design Secure Architecture 0.00 0.00 0.00 0.00 0.00
1.00
Incident Management Threat Assessment
Implementation Secure Build 0.00 0.00 0.00 0.00 Implementation Secure Build 0.00 0.00 0.00 0.00 0.00
Implementation Secure Deployment 0.00 0.00 0.00 0.00 Implementation Secure Deployment 0.00 0.00 0.00 0.00 0.00
-1.00
Implementation Defect Management 0.00 0.00 0.00 0.00 Security Testing Security Requirements Implementation Defect Management 0.00 0.00 0.00 0.00 0.00
Verification Architecture Assessment 0.00 0.00 0.00 0.00 Verification Architecture Assessment 0.00 0.00 0.00 0.00 0.00
Requirements Testing Secure Architecture
Verification Requirements Testing 0.00 0.00 0.00 0.00 Verification Requirements Testing 0.00 0.00 0.00 0.00 0.00
Verification Security Testing 0.00 0.00 0.00 0.00 Architecture Assessment Secure Build Verification Security Testing 0.00 0.00 0.00 0.00 0.00
Operations Incident Management 0.00 0.00 0.00 0.00 Defect Management Secure Deployment Operations Incident Management 0.00 0.00 0.00 0.00 0.00
Operations Environment Management 0.00 0.00 0.00 0.00 Operations Environment Management 0.00 0.00 0.00 0.00 0.00
SAMM Current Score
Operations Operational Management 0.00 0.00 0.00 0.00 Operations Operational Management 0.00 0.00 0.00 0.00 0.00
Governance Policy & Compliance 0.00 0.00 0.00 0.00 Design 0.00 Governance Policy & Compliance 0.00 0.00 0.00 0.00 0.00
Strategy & Metrics
Governance Education & Guidance 0.00 0.00 0.00 0.00 Implementation 0.00 Operational Management Policy & Compliance Governance Education & Guidance 0.00 0.00 0.00 0.00 0.00
3.00
Design Threat Assessment 0.00 0.00 0.00 0.00 Verification 0.00 Design Threat Assessment 0.00 0.00 0.00 0.00 0.00
Environment Management Education & Guidance
Design Security Requirements 0.00 0.00 0.00 0.00 Operations 0.00 Design Security Requirements 0.00 0.00 0.00 0.00 0.00
Design Secure Architecture 0.00 0.00 0.00 0.00 Overall 0.00 1.00 Design Secure Architecture 0.00 0.00 0.00 0.00 0.00
Incident Management Threat Assessment
Implementation Secure Build 0.00 0.00 0.00 0.00 Implementation Secure Build 0.00 0.00 0.00 0.00 0.00
Implementation Secure Deployment 0.00 0.00 0.00 0.00 Implementation Secure Deployment 0.00 0.00 0.00 0.00 0.00
-1.00
Implementation Defect Management 0.00 0.00 0.00 0.00 Security Testing Security Requirements Implementation Defect Management 0.00 0.00 0.00 0.00 0.00
Verification Architecture Assessment 0.00 0.00 0.00 0.00 Verification Architecture Assessment 0.00 0.00 0.00 0.00 0.00
Verification Requirements Testing 0.00 0.00 0.00 0.00 Verification Requirements Testing 0.00 0.00 0.00 0.00 0.00
Requirements Testing Secure Architecture
Verification Security Testing 0.00 0.00 0.00 0.00 Verification Security Testing 0.00 0.00 0.00 0.00 0.00
Operations Incident Management 0.00 0.00 0.00 0.00 Architecture Assessment Secure Build Operations Incident Management 0.00 0.00 0.00 0.00 0.00
Operations Environment Management 0.00 0.00 0.00 0.00 Defect Management Secure Deployment Operations Environment Management 0.00 0.00 0.00 0.00 0.00
Phase I Score
Operations Operational Management 0.00 0.00 0.00 0.00 Operations Operational Management 0.00 0.00 0.00 0.00 0.00
Governance Policy & Compliance 0.00 0.00 0.00 0.00 Design 0.00 Governance Policy & Compliance 0.00 0.00 0.00 0.00 0.00
Strategy & Metrics
Governance Education & Guidance 0.00 0.00 0.00 0.00 Implementation 0.00 Operational Management Policy & Compliance Governance Education & Guidance 0.00 0.00 0.00 0.00 0.00
3.00
Design Threat Assessment 0.00 0.00 0.00 0.00 Verification 0.00 Design Threat Assessment 0.00 0.00 0.00 0.00 0.00
Environment Management Education & Guidance
Design Security Requirements 0.00 0.00 0.00 0.00 Operations 0.00 Design Security Requirements 0.00 0.00 0.00 0.00 0.00
Design Secure Architecture 0.00 0.00 0.00 0.00 Overall 0.00 1.00 Design Secure Architecture 0.00 0.00 0.00 0.00 0.00
Incident Management Threat Assessment
Implementation Secure Build 0.00 0.00 0.00 0.00 Implementation Secure Build 0.00 0.00 0.00 0.00 0.00
Implementation Secure Deployment 0.00 0.00 0.00 0.00 Implementation Secure Deployment 0.00 0.00 0.00 0.00 0.00
-1.00
Implementation Defect Management 0.00 0.00 0.00 0.00 Security Testing Security Requirements Implementation Defect Management 0.00 0.00 0.00 0.00 0.00
Verification Architecture Assessment 0.00 0.00 0.00 0.00 Verification Architecture Assessment 0.00 0.00 0.00 0.00 0.00
Verification Requirements Testing 0.00 0.00 0.00 0.00 Verification Requirements Testing 0.00 0.00 0.00 0.00 0.00
Requirements Testing Secure Architecture
Verification Security Testing 0.00 0.00 0.00 0.00 Verification Security Testing 0.00 0.00 0.00 0.00 0.00
Operations Incident Management 0.00 0.00 0.00 0.00 Architecture Assessment Secure Build Operations Incident Management 0.00 0.00 0.00 0.00 0.00
Operations Environment Management 0.00 0.00 0.00 0.00 Defect Management Secure Deployment Operations Environment Management 0.00 0.00 0.00 0.00 0.00
Phase II Score
Operations Operational Management 0.00 0.00 0.00 0.00 Operations Operational Management 0.00 0.00 0.00 0.00 0.00
Governance Policy & Compliance 0.00 0.00 0.00 0.00 Design 0.00 Governance Policy & Compliance 0.00 0.00 0.00 0.00 0.00
Strategy & Metrics
Governance Education & Guidance 0.00 0.00 0.00 0.00 Implementation 0.00 Operational Management Policy & Compliance Governance Education & Guidance 0.00 0.00 0.00 0.00 0.00
3.00
Design Threat Assessment 0.00 0.00 0.00 0.00 Verification 0.00 Design Threat Assessment 0.00 0.00 0.00 0.00 0.00
Environment Management Education & Guidance
Design Security Requirements 0.00 0.00 0.00 0.00 Operations 0.00 Design Security Requirements 0.00 0.00 0.00 0.00 0.00
Design Secure Architecture 0.00 0.00 0.00 0.00 Overall 0.00 1.00 Design Secure Architecture 0.00 0.00 0.00 0.00 0.00
Incident Management Threat Assessment
Implementation Secure Build 0.00 0.00 0.00 0.00 Implementation Secure Build 0.00 0.00 0.00 0.00 0.00
Implementation Secure Deployment 0.00 0.00 0.00 0.00 Implementation Secure Deployment 0.00 0.00 0.00 0.00 0.00
-1.00
Implementation Defect Management 0.00 0.00 0.00 0.00 Security Testing Security Requirements Implementation Defect Management 0.00 0.00 0.00 0.00 0.00
Verification Architecture Assessment 0.00 0.00 0.00 0.00 Verification Architecture Assessment 0.00 0.00 0.00 0.00 0.00
Verification Requirements Testing 0.00 0.00 0.00 0.00 Verification Requirements Testing 0.00 0.00 0.00 0.00 0.00
Requirements Testing Secure Architecture
Verification Security Testing 0.00 0.00 0.00 0.00 Verification Security Testing 0.00 0.00 0.00 0.00 0.00
Operations Incident Management 0.00 0.00 0.00 0.00 Architecture Assessment Secure Build Operations Incident Management 0.00 0.00 0.00 0.00 0.00
Operations Environment Management 0.00 0.00 0.00 0.00 Defect Management Secure Deployment Operations Environment Management 0.00 0.00 0.00 0.00 0.00
Phase III Score
Operations Operational Management 0.00 0.00 0.00 0.00 Operations Operational Management 0.00 0.00 0.00 0.00 0.00
Governance Policy & Compliance 0.00 0.00 0.00 0.00 Design 0.00 Governance Policy & Compliance 0.00 0.00 0.00 0.00 0.00
Strategy & Metrics
Governance Education & Guidance 0.00 0.00 0.00 0.00 Implementation 0.00 Operational Management Policy & Compliance Governance Education & Guidance 0.00 0.00 0.00 0.00 0.00
3.00
Design Threat Assessment 0.00 0.00 0.00 0.00 Verification 0.00 Design Threat Assessment 0.00 0.00 0.00 0.00 0.00
Environment Management Education & Guidance
Design Security Requirements 0.00 0.00 0.00 0.00 Operations 0.00 Design Security Requirements 0.00 0.00 0.00 0.00 0.00
Design Secure Architecture 0.00 0.00 0.00 0.00 Overall 0.00 1.00 Design Secure Architecture 0.00 0.00 0.00 0.00 0.00
Incident Management Threat Assessment
Implementation Secure Build 0.00 0.00 0.00 0.00 Implementation Secure Build 0.00 0.00 0.00 0.00 0.00
Implementation Secure Deployment 0.00 0.00 0.00 0.00 Implementation Secure Deployment 0.00 0.00 0.00 0.00 0.00
-1.00
Implementation Defect Management 0.00 0.00 0.00 0.00 Security Testing Security Requirements Implementation Defect Management 0.00 0.00 0.00 0.00 0.00
Verification Architecture Assessment 0.00 0.00 0.00 0.00 Verification Architecture Assessment 0.00 0.00 0.00 0.00 0.00
Verification Requirements Testing 0.00 0.00 0.00 0.00 Verification Requirements Testing 0.00 0.00 0.00 0.00 0.00
Requirements Testing Secure Architecture
Verification Security Testing 0.00 0.00 0.00 0.00 Verification Security Testing 0.00 0.00 0.00 0.00 0.00
Operations Incident Management 0.00 0.00 0.00 0.00 Architecture Assessment Secure Build Operations Incident Management 0.00 0.00 0.00 0.00 0.00
Operations Environment Management 0.00 0.00 0.00 0.00 Defect Management Secure Deployment Operations Environment Management 0.00 0.00 0.00 0.00 0.00
Phase IV Score
Operations Operational Management 0.00 0.00 0.00 0.00 Operations Operational Management 0.00 0.00 0.00 0.00 0.00
SAMM Assessment Interview: For
Instructions
Interview an individual based on the questions below organized according to SAMM Business Functions and Security Practices.
Select the best answer from the multiple choice drop down selections in the answer column.
Document additional information such as how and why in the "Interview Notes" column.
The formulas in hidden columns F-H will calculate the scores and update the Rating boxes and other worksheets as needed.
Once the interview is complete, go to the "Scorecard" sheet and follow instructions.
Organization:
Team/Application:
Interview Date:
Team Lead:
Contributors:
1
Do you use a set of metrics to measure the effectiveness and efficiency of the 0.00 0.00 0.00 0.00 0.00
application security program across applications?
Measure and Did you define Key Performance Indicators (KPI) from available application
2 security metrics?
Improve
Do you update the Application Security strategy and roadmap based on
3 application security metrics and KPIs?
Stream Level Policy & Compliance Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
Do you have and apply a common set of policies and standards throughout
1 your organization?
Policy & Do you publish the organization's policies as test scripts or run-books for
2 easy interpretation by development teams?
Standards
Do you regularly report on policy and standard compliance, and use that
3 information to guide compliance improvement efforts?
0.00 0.00 0.00 0.00 0.00
1 Do you have a complete picture of your external compliance obligations?
Do you have a standard set of security requirements and verification
Compliance 2 procedures addressing the organization's external compliance obligations?
Management
Do you regularly report on adherence to external compliance obligations and
3 use that information to guide efforts to close compliance gaps?
Stream Level Education & Guidance Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
Do you require employees involved with application development to take
1 SDLC training?
Training and Is training customized for individual roles such as developers, testers, or
2 security champions?
Awareness
Have you implemented a Learning Management System or equivalent to track
3 employee training and certification processes?
1
Do you identify and manage architectural design flaws with threat modeling? 0.00 0.00 0.00 0.00 0.00
Do you use a standard methodology, aligned on your application risk levels?
Threat Modeling 2
Do you regularly review and update the threat modeling methodology for your
3 applications?
Stream Level Security Requirements Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Do project teams specify security requirements during development?
Do you define, structure, and include prioritization in the artifacts of the
Software 2 security requirements gathering process?
Requirements
Do you use a standard requirements framework to streamline the elicitation of
3 security requirements?
1
Do stakeholders review vendor collaborations for security requirements and 0.00 0.00 0.00 0.00 0.00
methodology?
Do vendors meet the security responsibilities and quality measures of service
Supplier Security 2 level agreements defined by the organization?
Are vendors aligned with standard security controls and software
3 development tools and processes that the organization utilizes?
Stream Level Secure Architecture Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Do teams use security principles during design?
Architecture
2 Do you use shared security services during design?
Design
3 Do you base your design on available reference architectures?
1
Do you evaluate the security quality of important technologies used for
development?
0.00 0.00 0.00 0.00 0.00
Technology
Management 2 Do you have a list of recommended technologies for the organization?
Do you enforce the use of recommended technologies within the
3
organization?
Implementation
Current Phase I Phase II Phase III Phase IV
Stream Level Secure Build Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Is your full build process formally described?
Build Process 2 Is the build process fully automated?
3 Do you enforce automated security checks in your build processes?
1 Do you have solid knowledge about dependencies you're relying on? 0.00 0.00 0.00 0.00 0.00
Software 2 Do you handle 3rd party dependency risk by a formal process?
Dependencies Do you prevent build of software if it's affected by vulnerabilities in
3 dependencies?
Stream Level Secure Deployment Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Do you use repeatable deployment processes?
Deployment
2 Are deployment processes automated and employing security checks?
Process
3 Do you consistently validate the integrity of deployed artifacts?
1
Do you limit access to application secrets according to the least privilege
principle?
0.00 0.00 0.00 0.00 0.00
Secret
Management Do you inject production secrets into configuration files during deployment?
2
3 Do you practice proper lifecycle management for application secrets?
Stream Level Defect Management Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Do you track all known security defects in accessible locations?
Do you keep an overview of the state of security defects across the
Defect Tracking 2 organization?
3 Do you enforce SLAs for fixing security defects?
1
Do you use basic metrics about recorded security defects to carry out quick
win improvement activities?
0.00 0.00 0.00 0.00 0.00
Metrics and Do you improve your security assurance program upon standardized metrics?
2
Feedback
Do you regularly evaluate the effectiveness of your security metrics so that its
3 input helps drive your security strategy?
1
Do you review the application architecture for mitigations of typical threats on 0.00 0.00 0.00 0.00 0.00
an ad-hoc basis?
Architecture
2 Do you regularly evaluate the threats to your architecture?
Mitigation
Do you regularly update your reference architectures based on architecture
3 assessment findings?
Stream Level Requirements Testing Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
Do you test applications for the correct functioning of standard security
1 controls?
Control
Do you consistently write and execute test scripts to verify the functionality of
Verification 2 security requirements?
3 Do you automatically test applications for security regressions?
0.00 0.00 0.00 0.00 0.00
1 Do you test applications using randomization or fuzzing techniques?
Misuse/Abuse Do you create abuse cases from functional requirements and use them to
2 drive security tests?
Testing
3 Do you perform denial of service and security stress testing?
Stream Level Security Testing Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
1 Do you scan applications with automated security testing tools?
Do you customize the automated security tools to your applications and
Scalable 2 technology stacks?
Baseline
Do you integrate automated security testing into the build and deploy
3
process?
1
Do you manually review the security quality of selected high-risk 0.00 0.00 0.00 0.00 0.00
components?
Deep Do you perform penetration testing for your applications at regular intervals?
2
Understanding
Do you use the results of security testing to improve the development
3 lifecycle?
Stream Level Environment Management Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
Do you harden configurations for key components of your technology stacks?
1
Configuration
Hardening 2 Do you have hardening baselines for your components?
3 Do you monitor and enforce conformity with hardening baselines?
Stream Level Operational Management Answer Rating Answer Rating Answer Rating Answer Rating Answer Rating
Do you protect and handle information according to protection requirements
1 for data stored and processed on each application?
Do you maintain a data catalog, including types, sensitivity levels, and
Data Protection 2 processing and storage locations?
Do you regularly review and update the data catalog and your data protection
3 policies and procedures?
Security Practice
Phase 1 Phase 2 Phase 3 Phase 4
1.2
1.00
0.80
0.60
0.40
0.20
Strategy & metrics
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
0.20
Policy & Compliance
0.001
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
0.20
Education & Guidance 0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
Threat Assessment 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.8
0.80
0.60
0.40
Security Requirements 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
Secure Architecture 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.6
0.80
0.60
0.40
Secure Build 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
Secure Deployment 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.4
0.40
Defect Management 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
Architecture Assessment 0.20
0.00
1 2 3 4 5 6 7 8 9
0.2
1.00
0.80
0.60
0.40
Requirements Testing 0.20
0.00
1 2 3 4 5 6 7 8 9
1.00
0.80
0.60
0.40
Security Testing 0.20
0.00
1 2 3 4 5 6 7 8 9
1.000
1 2 3
0.80
0.60
0.40
0.20