BSIMM12: Takeaways and Recommendations to Help Improve Your Software Security Program

By : By: Fred Bals, Senior Technical Writer, Synopsys Software Integrity Group | Tuesday, October 05 2021 - 10:25 IWST

 Synopsys Software Integrity Group
Synopsys Software Integrity Group

INDUSTRY.co.id - BSIMM12 gathers research on software security activities from real-life firms to create a guide that helps you navigate your software security initiative.

The popular business book, “The 7 Habits of Highly Effective People,” explores the theory that successful individuals share common qualities in achieving their goals, and that these qualities can be identified and applied by others.

Applying the premise to software security, the Building Security In Maturity Model project, better known as BSIMM, examines organisations’ software security initiatives, conducts in-person interviews on those organisations’ activities, and publishes its findings annually.

Now in its 12th iteration, the BSIMM report has grown from nine participating companies in 2008 to 128 in 2021, representing nearly 3,000 software security group members and over 6,000 satellite (aka Security Champion) members working with nearly 400,000 developers on over 150,000 applications.

The 2021 edition of the BSIMM report — BSIMM12 — examines anonymised data from the software security activities of 128 organisations across various verticals, including financial services, FinTech, independent software vendors, IoT, healthcare, and technology organisations.

Participating organisations include industry leaders such as Aetna, Bank of America, Citigroup, Freddie Mac, and Johnson & Johnson. 

BSIMM12 demonstrates that every business is in the software business 

Many of the organisations examined in BSIMM12 identify with traditional verticals, but all recognise that they are fundamentally in the software business. Software plays a leading role in every organisation’s operations.

Delays in software development and deployment affect product release dates, the lifeblood that drives revenue and profit. Businesses that sell software or sell products that include embedded software can’t afford to have security, compliance, or quality issues compromise their products. 

Even businesses not directly engaged in selling software or software-driven products are just as dependent on software quality and security. Software drives the administrative systems for their payroll, billing, receivables, sales tracking, and customer records.

Software controls their production, manages inventories, directs warehousing, and runs the distribution systems that keeps a business running. In service industries, software is used to analyse, optimise, model, interact with, and support customers.

The BSIMM12 findings tell us that software risk is business risk, and to effectively manage the second, you have to address the first.

Four top software security trends in BSIMM12

Software security groups are increasingly lending resources, staff, and knowledge to DevOps: There is a shift away from mandating software security behaviours to having security teams forge partnerships with development teams — with an objective of proactively including security efforts into the critical path for software delivery.

Continuous testing is on the rise: BSIMM12 data indicates that more firms are favouring continuous monitoring and reporting rather than using a point-in-time defect discovery approach and are then using security telemetry to drive improvements in software development and governance processes.

Decomposing tests into smaller, timely checks and running these more frequently: The imperative to identify software issues as early as possible remains, driving the need to decompose big testing events into smaller, timely checks.

But there is also a growing realisation among software security groups that sometimes deployment orchestration or the post-deployment environment reflects the earliest, best opportunity for some tests.

Applying policy-as-code, or governance-as-code, is sharply increasing: Governance-as-code moves security practices and adherence with compliance policies away from a manual approach to a more consistent, efficient, repeatable, and automated approach.

BSIMM data collected in earlier years indicated that organisations were beginning the process of replacing manual, human-driven governance activities with automation.

BSIMM12 observations now indicate the sole source of software security standards and policy is increasingly becoming human-readable configuration code or simplified code that conducts vulnerability discovery — the essence of software-defined life cycle governance.

News Comment

Today's Industry

Fuse, The insurtech companies

Jumat, 26 November 2021 - 16:11 WIB

FUSE Being The Only Insurtech From Indonesia Included In "The World's Top 100 Insurtech 2021"

Sønr Global, the world's leading market intelligence platform designed specifically for the insurance industry, along with leading consultant Ernst & Young (EY), have just released the World's…

PT Dharma Polimetal Tbk's advanced robot technology to produce electric vehicle components

Jumat, 26 November 2021 - 15:00 WIB

Ahead of IPO, DRMA Stimulates Electric Vehicle Component Business Opportunities in Indonesia

PT Dharma Polimetal Tbk (“DRMA”), an automotive component manufacturing company belonging to the Triputra Group which is planning to conduct an Initial Public Offering (IPO) at the end of…

Dr Maria Corlianò Co-Founder and Chief Technology Officer, OSbiome

Jumat, 26 November 2021 - 14:10 WIB

OSBIOME: Personalised Self-Care Platform For Optimum Health Management Through The Gut

Discussing gut issues such as bloating, diarrhoea and constipation with your partner, family or close friends can be embarrassing and disheartening. Many also tend to shrug off the pain and…

Citi Indonesia CEO, Batara Sianturi

Jumat, 26 November 2021 - 13:25 WIB

Citi Indonesia Posted Rp869 Billion in Net Income during Third Quarter of 2021

Citibank N.A., Indonesia (Citi Indonesia) posted a Net Income of Rp869 billion during the third quarter of 2021. The earning is lower than the same period last year, driven by lower trading…

Cybersecurity Jobs. PHOTO: Cybercrime Magazine.

Rabu, 24 November 2021 - 21:00 WIB

What vulnerabilities and security issues plague web and mobile apps?

One of the most compelling reasons organisations use third-party application security testing is to extend their own software security testing capability when circumstances make adding new resources…