Академический Документы
Профессиональный Документы
Культура Документы
The model is based on the study done on organisations across the industries like financial service
sectors, Healthcare sectors, Software sectors, cloud providers and more.
WHY HACK2SECURE SUPPORTS TO ADOPT BSIMM7
FRAMEWORK:
A. Governance
1. Strategy & Metrics (SM)
2. Compliance & Policy (CP)
3. Training (T)
B. Intelligence
4. Attack Models (AM)
5. Security Features & Design (SFD)
6. Standards & Requirements (SR)
C. SSDL Touchpoints
7. Architecture Analysis (AA)
8. Code Review (CR)
9. Security Testing (ST)
D. Deployment
10. Penetration Testing (PT)
11. Software Environment (SE)
12. Configuration Management & Vulnerability
Management (CMVM)
A. DOMAIN: GOVERNANCE
3. Training (T):
Deals with activities related different Security Testing methods like Black-
box, Fuzzing, Automation, Risk driven White Box Analysis etc.
D. DOMAIN: DEPLOYMENT
This is helping them to increase their business units, and drive their
budgeting.