Profile Applicability:
 Level 1

Description:
 Automated security scanning tools must be integrated into the software development lifecycle to analyze source code and binaries for vulnerabilities such as insecure coding practices, known exploits, and security misconfigurations. These scanners enable early detection and remediation of vulnerabilities before deployment.

Rationale:
 Early identification of code vulnerabilities reduces the risk of exploitation in production environments. Automated scanning supports secure coding standards, improves software quality, and aids compliance with security regulations and best practices.

Impact:
 Pros:

  • Detects vulnerabilities early in the development process.

  • Helps maintain secure and reliable software.

  • Supports regulatory compliance and audit readiness.

  • Facilitates continuous security improvement.

Cons:

  • May produce false positives requiring manual review.

  • Requires tool integration and maintenance effort.

Default value:
 Some development processes lack automated vulnerability scanning, increasing security risks.

Audit:
 Review scan reports and remediation actions. Verify that scanning tools are integrated and active across projects and pipelines.

Remediation:
 Deploy static and dynamic analysis tools (e.g., SAST, DAST) within development workflows. Establish policies mandating vulnerability scanning. Train developers on interpreting and fixing scan results.

References:

  1. OWASP Code Review Guide: https://owasp.org/www-project-code-review-guide/

  2. SANS Software Security Resources: https://www.sans.org/software-security/

  3. CIS Controls v8, Control 6 - Maintenance, Monitoring, and Analysis of Audit Logs: https://www.cisecurity.org/controls/maintenance-monitoring-and-analysis-of-audit-logs/