Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Three Approaches to More Secure Software Development
Cybersecurity

Three Approaches to More Secure Software Development

Chris HughesBy Chris HughesDecember 30, 20214 Mins Read
Facebook Twitter LinkedIn Email
Secure Software Development
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

While application security is certainly not a new domain or topic, it is increasingly cited as a priority among security and technology executives. There are many aspects to implementing effective application security. One key aspect is following secure software development practices for internal application development activities.

There’s an overarching inclination as an industry and ecosystem to “push security left” and implement a secure software development lifecycle. Part of doing that involves building secure software development practices as part of application development activities. However, for organizations early in this journey, it can be confusing to understand where to start and what to follow.

To help bridge that gap, we will discuss three leading frameworks intended to reduce the number of vulnerabilities created during software development. The three sources we will be looking at are OWASP’s Software Assurance Maturity Model (SAMM), Synopsys Building Security In Maturity Model (BSIMM) and NIST’s Secure Software Development Framework (SSDF).

OWASP Software Assurance Maturity Model

First on the list is OWASP’s SAMM. SAMM is broken down across five business functions: governance, design, implementation, verification, and operations. Each function includes three security practices, and each security practice contains three levels of maturity.

One of the major differences between SAMM and BSIMM is that SAMM is a prescriptive model, whereas BSIMM is descriptive. Therefore, SAMM prescribes specific actions and practices organizations can take to improve their software assurance. SAMM is an open-source framework, meaning it isn’t proprietary and can be contributed to by the community.

BSIMM

On the other hand, BSIMM is a descriptive study of software security initiatives across various organizations with differing levels of maturity. It compiles these findings and quantifies them as part of its annually published studies. BSIMM is on its 11th iteration and has over 130 contributing organizations, providing a richly diverse set of contributors.

Unlike SAMM or SSDF, which are open source, the BSIMM is a licensed model through Synopsys, formerly Cigital. This licensing model means that some of the underlying calculations and assessment questions across the security activities and domains are not made public. Additionally, organizations must work through Synopsys to get officially assessed with the BSIMM model and join the community of other organizations that have done so.

NIST SSDF

NIST’s SSDF, also known as NIST 800-218, provides a core set of secure development practices which can be integrated throughout the Software Development Lifecycle (SDLC). What’s unique about SSDF is that, unlike BSIMM or SAMM, SSDF doesn’t define its own unique practices, but instead pulls from existing secure software development guidance and sources such as BSIMM, SAMM, OWASP ASVS, and existing NIST guidance among others.

Much like BSIMM, while SSDF describes secure software development practices, it doesn’t prescribe how to implement them. This allows for a flexible and dynamic framework focused on secure software outcomes rather than specific implementation details. SSDF also takes a plain-language approach, making it a valuable tool for discussing secure development practices across communities of business owners/executives, software producers, and consumers.

SSDF’s practices are organized into four groups: preparing the organization; protecting the software; producing well-secured software; and responding to vulnerabilities.

Where To From Here?

While it is clear that more executive leadership across organizations are stating that secure application development is a priority, there has to be action associated with those claims. Not knowing exactly where to start is a problem for some, and that is where guidance such as SAMM, BSIMM, and SSDF can come into play.

The concern to mitigate software vulnerabilities also crosses the chasm from the private sector into the public sector. The recent Cybersecurity Executive Order (EO) included requirements for NIST to identify secure software development practices. That is where the underway improvements of their SSDF come into play, which included several workshops throughout 2020.

This existing and evolving industry guidance for secure software development, coupled with talking points from leadership, is promising. That said, it isn’t all sunshine and rainbows. Organizations are increasingly depending on open source software (OSS), and in recent studies by Harvard and the Linux Foundation, the average free and open source software (FOSS) developer-only spent about 2.3% of their time on improving the security of their code. Securing the open source software supply chain will be a topic for another discussion.

These problems aside, organizations should have a vested interest in producing secure and resilient software. Failing to produce secure software can have myriad ramifications, such as loss of customer trust, loss of revenue, and regulatory consequences. Utilizing the frameworks and guidance discussed above is a great start for any organization looking to improve the security hygiene of its software.

Cybersecurity Cybersecurity is an Enabler featured
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025

ServiceNow Re-Invents CRM for End-to-End Enterprise

May 8, 2025

Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT

May 7, 2025

Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’

May 7, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise
  • Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT
  • Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’
  • With Latest Agentic AI Products, ServiceNow Embraces Third-Party Platforms, Data Sources

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.