Skip to main content

WEB-07: Web Security Standard

WEB 9 — Critical Protect

Mechanisms exist to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.

Control Question: Does the organization ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process?

General (4)
Framework Mapping Values
CIS CSC 8.1 16 16.1 16.7 16.10
CIS CSC 8.1 IG2 16.1 16.7
CIS CSC 8.1 IG3 16.1 16.7
CSA CCM 4 AIS-04
EMEA (1)
Framework Mapping Values
EMEA Saudi Arabia CSCC-1 2019 2-12-1-2
APAC (2)
Framework Mapping Values
APAC Australia ISM June 2024 ISM-0971 ISM-1239
APAC New Zealand NZISM 3.6 14.5.7.C.01 14.5.8.C.01

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process.

Level 3 — Well Defined

Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.

  • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
  • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unauthorized.
  • Ongoing content reviews are performed to ensure web pages do not contain non-public information.
  • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs).
  • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies.
  • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity.
  • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management.
  • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
  • Boundary protections:
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into its Secure Systems Development Lifecycle (SSDLC) process.

Assessment Objectives

  1. WEB-07_A01 the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.