ã¯ããã«ïŒ OWASP SAMMãšã¯ïŒ
ãOWASP SAMMïŒãªã¯ã¹ã ãµã ïŒããšããèšèãèããããšããããŸããïŒ ð€ ããã¯ããœãããŠã§ã¢éçºã«ãããã»ãã¥ãªãã£å¯Ÿçã®æç床ïŒã©ãããããã£ããã§ããŠãããïŒã枬ããæ¹åããŠããããã®ãã¬ãŒã ã¯ãŒã¯ã§ãã
OWASP (Open Web Application Security Project) ãšãããWebã¢ããªã±ãŒã·ã§ã³ã®ã»ãã¥ãªãã£åäžãç®æããªãŒãã³ãªã³ãã¥ããã£ã«ãã£ãŠéçºãããŸãããSAMMã¯ãSoftware Assurance Maturity Modelãã®ç¥ã§ãçŽèš³ãããšããœãããŠã§ã¢ä¿èšŒæç床ã¢ãã«ããšãªããŸãã
ç°¡åã«èšããšãããªãã®äŒç€ŸãããŒã ãäœã£ãŠãããœãããŠã§ã¢ã®ã»ãã¥ãªãã£å¯Ÿçããä»ã©ã®ã¬ãã«ã«ãã£ãŠãããããã©ãæ¹åããŠããã°è¯ãã®ãããèŠããåãããŠããããããã°ããœãããŠã§ã¢éçºã®å¥åº·èšºæããŒã«ãã®ãããªãã®ã§ãð©ºã
ãã®ããã°ã§ã¯ãåå¿è ã®æ¹ã«ãåããããããOWASP SAMMã«ã€ããŠè§£èª¬ããŠãããŸãïŒ
OWASP SAMMã¯äœãç®æããŠããã®ïŒð¯
OWASP SAMMã®äž»ãªç®çã¯ãçµç¹ãèªåãã¡ã®ãœãããŠã§ã¢ã»ãã¥ãªãã£ã®ç¶æ³ã客芳çã«è©äŸ¡ããæ¹åããŠããããã®éçã瀺ãããšã§ããå ·äœçã«ã¯ã以äžã®ãããªããšãç®æããŠããŸãã
- çŸç¶è©äŸ¡: ä»ãã©ããªã»ãã¥ãªãã£å¯ŸçãããŠããŠãã©ã®ãããã®ã¬ãã«ãªã®ãã客芳çã«è©äŸ¡ããã
- æ¹åèšç»ã®çå®: è©äŸ¡çµæãããšã«ãã©ããéç¹çã«æ¹åãã¹ãããå ·äœçãªç®æšãèšå®ããèšç»ãç«ãŠãã
- é²æ枬å®: èšç»ã«æ²¿ã£ãŠæ¹åãé²ãããã®å¹æã枬å®ããç¶ç¶çã«ã»ãã¥ãªãã£ã¬ãã«ãé«ããŠããã
- çµç¹ã«åããã調æŽ: ã©ããªèŠæš¡ã®çµç¹ã§ããã©ããªéçºããã»ã¹ïŒãŠã©ãŒã¿ãŒãã©ãŒã«ãã¢ãžã£ã€ã«ãDevOpsãªã©ïŒã§ã䜿ããããã«ãæè»ã«èª¿æŽã§ããã
SAMMã¯ããå®ç§ãªã»ãã¥ãªãã£ãããããªãç®æãã®ã§ã¯ãªããçµç¹ã®ãªã¹ã¯ãç¶æ³ã«åãããŠã段éçã«ã»ãã¥ãªãã£ã¬ãã«ãåäžãããŠããããšãéèŠããŠããŸãðã
OWASP SAMMã®æ§æèŠçŽ ïŒããžãã¹æ©èœãšã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ð§©
OWASP SAMMã¯ããœãããŠã§ã¢éçºã©ã€ããµã€ã¯ã«å šäœãã«ããŒããããã«ã5ã€ã®ãããžãã¹æ©èœïŒBusiness FunctionsïŒããšãããããã®ããžãã¹æ©èœã«å±ãã3ã€ã®ãã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ïŒSecurity PracticesïŒãïŒåèš15åïŒã§æ§æãããŠããŸãã
åããžãã¹æ©èœãšã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®æŠèŠã¯ä»¥äžã®è¡šã®éãã§ãã
ããžãã¹æ©èœ (Business Function) | ã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ (Security Practice) | äž»ãªç®ç |
---|---|---|
ã¬ããã³ã¹ (Governance) çµç¹å šäœã®ãœãããŠã§ã¢éçºã管çããæ¹æ³ |
æŠç¥ãšææš (Strategy & Metrics) | çµç¹ã®ãªã¹ã¯ã«åºã¥ããã»ãã¥ãªãã£æŠç¥ãç«ãŠããã®å¹æã枬å®ããã |
ããªã·ãŒãšã³ã³ãã©ã€ã¢ã³ã¹ (Policy & Compliance) | ã»ãã¥ãªãã£ã«é¢ããã«ãŒã«ïŒããªã·ãŒïŒãå®ãããããå®ãããŠããã確èªããã | |
æè²ãšæå° (Education & Guidance) | éçºè ãé¢ä¿è ã«ã»ãã¥ãªãã£ã«é¢ããç¥èãã¹ãã«ã身ã«ã€ããŠãããã | |
èšèš (Design) ãœãããŠã§ã¢ã®èšèšæ®µéã§ã®ã»ãã¥ãªãã£å¯Ÿç |
è åšã¢ããªã³ã° (Threat Modeling) | ãœãããŠã§ã¢ã«æœãå¯èœæ§ã®ããè åšïŒæ»æãããããªç®æïŒãæŽãåºãã |
ã»ãã¥ãªãã£èŠä»¶ (Security Requirements) | ãœãããŠã§ã¢ã«å¿ èŠãªã»ãã¥ãªãã£æ©èœã察çãæ確ã«ããã | |
ã»ãã¥ã¢ã¢ãŒããã¯ã㣠(Secure Architecture) | ã»ãã¥ãªãã£ã«é æ ®ãããœãããŠã§ã¢ã®æ§é ïŒèšèšå³ïŒãäœãã | |
å®è£
(Implementation) ã³ãŒãã£ã³ã°ããã«ãããããã€æã®ã»ãã¥ãªãã£å¯Ÿç |
ã»ãã¥ã¢ãã«ã (Secure Build) | å®å šãªæ¹æ³ã§ãœãããŠã§ã¢ãçµã¿ç«ãŠãïŒãã«ãããïŒããã»ã¹ã確ç«ããã |
ã»ãã¥ã¢ãããã€ã¡ã³ã (Secure Deployment) | å®å šãªæ¹æ³ã§ãœãããŠã§ã¢ãæ¬çªç°å¢ãªã©ã«å±éïŒãããã€ïŒããããã»ã¹ã確ç«ããã | |
æ¬ é¥ç®¡ç (Defect Management) | çºèŠãããã»ãã¥ãªãã£äžã®åé¡ïŒè匱æ§ãªã©ïŒã管çããä¿®æ£ããããã»ã¹ã確ç«ããã | |
æ€èšŒ (Verification) ãœãããŠã§ã¢ã®ã»ãã¥ãªãã£ããã¹ãã»ç¢ºèªããæ¹æ³ |
ã¢ãŒããã¯ãã£è©äŸ¡ (Architecture Assessment) | èšèšïŒã¢ãŒããã¯ãã£ïŒãã»ãã¥ãªãã£çã«åé¡ãªããè©äŸ¡ããã |
èŠä»¶é§åãã¹ã (Requirements-Driven Testing) | å®çŸ©ããã»ãã¥ãªãã£èŠä»¶ãæºããããŠããããã¹ãããã | |
ã»ãã¥ãªãã£ãã¹ã (Security Testing) | æ§ã ãªææ³ïŒè匱æ§ã¹ãã£ã³ããããã¬ãŒã·ã§ã³ãã¹ããªã©ïŒã§ã»ãã¥ãªãã£äžã®åé¡ããªãããã¹ãããã | |
éçš (Operations) ãœãããŠã§ã¢çšŒååŸã®ã»ãã¥ãªãã£ç®¡ç |
ã€ã³ã·ãã³ã管ç (Incident Management) | ã»ãã¥ãªãã£äºæ ïŒã€ã³ã·ãã³ãïŒãçºçããéã®å¯Ÿå¿ããã»ã¹ãæºåã»å®è¡ããã |
ç°å¢ç®¡ç (Environment Management) | ãœãããŠã§ã¢ãåãç°å¢ïŒãµãŒããŒãOSãªã©ïŒãå®å šã«ä¿ã€ã | |
éçšç®¡ç (Operational Management) | æ¥ã ã®éçšæ¥åïŒããŒã¿ã®ããã¯ã¢ãããã¢ã¯ã»ã¹æš©ç®¡çãªã©ïŒãå®å šã«è¡ãã |
ãããã®ãã©ã¯ãã£ã¹ããšã«ãèªç€Ÿã®åãçµã¿ç¶æ³ãè©äŸ¡ããŠããããšã«ãªããŸãã
æç床ã¬ãã«ïŒã»ãã¥ãªãã£ã¬ãã«ã枬ããã®ããð
OWASP SAMMã§ã¯ãåã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®éæ床åãããæç床ã¬ãã«ïŒMaturity LevelsïŒããšããææšã§è©äŸ¡ããŸããã¬ãã«ã¯0ãã3ãŸã§ã®4段éãããŸãã
- ã¬ãã« 0: æªå®æœ (Inactive) – ãã®ãã©ã¯ãã£ã¹ã«é¢ãã掻åãã»ãšãã©è¡ãããŠããªãç¶æ ã
- ã¬ãã« 1: åæ段é (Initial) – ããã€ãã®åºæ¬çãªæŽ»åãã¢ãããã¯ïŒå ŽåœããçïŒã«è¡ãããŠããç¶æ ã
- ã¬ãã« 2: å®çŸ©æžã¿ (Defined) – 掻åãæšæºåãããææžåãããŠããç¶æ ãå€ãã®çµç¹ã§å®å®ããŠå®æœãããŠããã
- ã¬ãã« 3: ç¿ç (Mastery) – 掻åãæé©åãããå¹æã枬å®ãããç¶ç¶çã«æ¹åãããŠããç¶æ ã
å šãŠã®ãã©ã¯ãã£ã¹ã§ã¬ãã«3ãç®æãå¿ èŠã¯ãããŸãããçµç¹ã®ãªã¹ã¯ãããžãã¹ç®æšã«åãããŠãåãã©ã¯ãã£ã¹ã§ç®æãã¹ãã¬ãã«ïŒç®æšã¬ãã«ïŒãèšå®ããããšãéèŠã§ãã
OWASP SAMMã䜿ã£ãŠã¿ããïŒð ïž
ã§ã¯ãå®éã«OWASP SAMMãã©ã®ããã«æŽ»çšããŠããã®ã§ããããïŒåºæ¬çãªã¹ãããã¯ä»¥äžã®éãã§ãã
- ã¢ã»ã¹ã¡ã³ãïŒè©äŸ¡ïŒ: ãŸããçŸç¶ã®ææ¡ããå§ããŸããOWASP SAMMãæäŸãã質å祚ãããŒã«ã䜿ã£ãŠãåã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®æç床ã¬ãã«ãè©äŸ¡ããŸããèªå·±è©äŸ¡ã§ããå€éšã®å°é家ã«ããè©äŸ¡ã§ãæ§ããŸããã
- ç®æšèšå®: ã¢ã»ã¹ã¡ã³ãçµæãšãçµç¹ã®ãªã¹ã¯ãããžãã¹ç®æšãèæ ®ããŠãåãã©ã¯ãã£ã¹ã§ç®æãæç床ã¬ãã«ïŒã¿ãŒã²ããã¬ãã«ïŒã決å®ããŸãã
- ããŒããããäœæ: çŸç¶ã¬ãã«ãšç®æšã¬ãã«ã®ã®ã£ãããåããããã®å ·äœçãªèšç»ïŒããŒããããïŒãäœæããŸããã©ã®ãã©ã¯ãã£ã¹ããããã€ãŸã§ã«ãã©ã®ãããªæŽ»åãè¡ãããæ確ã«ããŸãã
- æ¹åãšåè©äŸ¡: ããŒããããã«æ²¿ã£ãŠæ¹å掻åãå®æœããŸãããããŠãäžå®æéåŸïŒäŸãã°å幎åŸã1幎åŸïŒã«å床ã¢ã»ã¹ã¡ã³ããè¡ããé²æã確èªããå¿ èŠã«å¿ããŠç®æšãããŒãããããèŠçŽããŸãããã®ãµã€ã¯ã«ãç¹°ãè¿ãããšã§ãç¶ç¶çã«ã»ãã¥ãªãã£ã¬ãã«ãåäžãããŠãããŸãã
OWASP SAMMã®å ¬åŒãµã€ã (https://owaspsamm.org/) ã§ã¯ãã¢ã»ã¹ã¡ã³ãã«åœ¹ç«ã€ããŒã«ïŒExcelã·ãŒããªã©ïŒã詳ããããã¥ã¡ã³ãïŒv2.0ãææ°ïŒãç¡æã§æäŸãããŠããŸãããã²æŽ»çšããŠã¿ãŠãã ããã
ãŸãšãâš
OWASP SAMMã¯ããœãããŠã§ã¢éçºã«ãããã»ãã¥ãªãã£å¯Ÿçã®çŸç¶ã客芳çã«è©äŸ¡ããæ¹åããŠããããã®åŒ·åãªãã¬ãŒã ã¯ãŒã¯ã§ãã
å°å ¥ããããšã§ã以äžã®ãããªã¡ãªãããæåŸ ã§ããŸãã
- ã»ãã¥ãªãã£å¯Ÿçã®ç¶æ³ããèŠããåãããã課é¡ãæ確ã«ãªãð
- çµç¹ã®ãªã¹ã¯ã«åºã¥ãããçŸå®çãªæ¹åç®æšãšèšç»ãç«ãŠãããðºïž
- ç¶ç¶çãªæ¹åãµã€ã¯ã«ã«ãããçå®ã«ã»ãã¥ãªãã£ã¬ãã«ãåäžããðª
- çµç¹å šäœã§ã»ãã¥ãªãã£ã«å¯Ÿããæèãé«ãŸãð±
ãœãããŠã§ã¢ã®ã»ãã¥ãªãã£å¯Ÿçããäœããå§ããã°ãããåãããªãããã©ããŸã§ããã°ãããåãããªãããšæããŠãããªãããŸãã¯OWASP SAMMã䜿ã£ãŠçŸç¶ãè©äŸ¡ããŠã¿ãããšããå§ããŠã¿ãŠã¯ãããã§ããããïŒð
ã³ã¡ã³ã