SF² and BSIMM Integration¶
Framework Overview¶
BSIMM (Building Security In Maturity Model) - Focus: Security activity measurement and benchmarking - Website: https://www.bsimm.com/ - Purpose: Describe what real organizations actually do for software security
Relationship to SF²¶
BSIMM describes 112 security activities that organizations perform, organized into 12 practices across 4 domains.
SF² helps determine which BSIMM activities to implement and in what sequence based on your organizational positioning and investment strategy.
Key Insight¶
BSIMM is descriptive, not prescriptive. It shows what organizations do, not what they should do.
SF² provides the strategic framework to: - Prioritize BSIMM activities based on your quadrant position - Sequence BSIMM activity implementation based on investment strategy - Determine which BSIMM activities to skip entirely - Identify when BSIMM activities should be automated vs manual
BSIMM Domains and Practices¶
BSIMM organizes 112 activities into 4 domains:
Governance¶
- Strategy & Metrics (SM)
- Compliance & Policy (CP)
- Training (T)
Intelligence¶
- Attack Models (AM)
- Security Features & Design (SFD)
- Standards & Requirements (SR)
SSDL Touchpoints¶
- Architecture Analysis (AA)
- Code Review (CR)
- Security Testing (ST)
Deployment¶
- Penetration Testing (PT)
- Software Environment (SE)
- Configuration Management & Vulnerability Management (CMVM)
SF² Investment Strategy and BSIMM¶
Visionaries (Simple + High Readiness)¶
BSIMM Activity Selection: Automation-friendly activities that scale
Priority BSIMM Activities: 1. CMVM (Configuration Management & Vulnerability Management) - Automated dependency scanning - Automated vulnerability remediation - Supply chain security automation 2. ST (Security Testing) - Automated SAST/DAST in CI/CD - Security test automation 3. SE (Software Environment) - Automated secure build - Infrastructure-as-code security 4. SFD (Security Features & Design) - Secure templates and paved roads - Automated security patterns
Skip or Minimize: - Manual architecture analysis (AA) - Manual code review (CR) - Extensive governance documentation (CP) - Time-intensive training programs (T) - prefer self-service documentation
Implementation Approach: Automate BSIMM activities from the start
Leaders (Complex + High Readiness)¶
BSIMM Activity Selection: Comprehensive coverage with platform effects
Priority BSIMM Activities: 1. All 12 practices with high activity coverage 2. Platform-scale implementation of BSIMM activities 3. Advanced activities (BSIMM Level 3) appropriate for complexity 4. Federated execution of BSIMM activities (security champions, guilds)
Optimization Focus: - Automate evidence collection for BSIMM activities - Platform capabilities enabling BSIMM activities org-wide - Eliminate low-value BSIMM activities (even if industry performs them) - Industry leadership in select BSIMM practices
Implementation Approach: Comprehensive BSIMM with efficiency focus
Niche Players (Simple + Low Readiness)¶
BSIMM Activity Selection: Essential activities only
Priority BSIMM Activities: 1. CMVM (Configuration Management & Vulnerability Management) - Basic dependency scanning - Vulnerability patching process 2. SR (Standards & Requirements) - Essential security requirements 3. ST (Security Testing) - Basic security testing 4. SE (Software Environment) - Essential build security
Skip Entirely: - Advanced governance activities (SM, CP) - Sophisticated attack modeling (AM) - Manual architecture analysis (AA) - Manual code review (CR) - Penetration testing (PT) - not cost-effective at this scale
Implementation Approach: Minimal BSIMM coverage, managed services where possible
Challengers (Complex + Low Readiness)¶
BSIMM Activity Selection: Hybrid (comprehensive for new, essential for legacy)
Priority BSIMM Activities by System:
New/Modern Systems: - Full BSIMM practice coverage - Automated implementation where possible - Build Leaders-level capabilities for future
Legacy Systems: - CMVM (vulnerability management) only - Essential security testing (ST) - Risk-based approach (not comprehensive)
Skip for Legacy: - Architecture analysis (AA) - legacy is what it is - Code review (CR) - not changing legacy code significantly - Sophisticated attack modeling (AM) - pragmatic risk assessment only
Implementation Approach: Build comprehensive BSIMM for new systems over 3-5 years
BSIMM Activity Prioritization Framework¶
High-Value Activities (Implement First)¶
These BSIMM activities provide highest ROI across all quadrants:
- CMVM - Supply chain security and vulnerability management
- Highest risk area (Supply Chain #1 priority)
- Automatable at all scales
-
Clear business value
-
ST - Automated security testing
- Scales with automation
- Catches issues early (cheaper to fix)
-
Reduces manual review burden
-
SE - Secure build environment
- Foundation for other activities
- Prevents supply chain attacks
- Enables automation
Moderate-Value Activities (Implement Selectively)¶
These BSIMM activities have value but require careful sequencing:
- SFD - Security features and design
- High value for Visionaries (secure templates)
-
Moderate value for others
-
SR - Standards and requirements
- Essential for regulated environments
-
Lower priority otherwise
-
SM - Strategy and metrics
- Critical for Leaders (optimization)
- Basic for Visionaries
- Minimal for Niche Players
Lower-Value Activities (Implement Last or Skip)¶
These BSIMM activities often don't justify their cost:
- AA - Architecture analysis
- Manual and doesn't scale
-
Consider skipping for automation instead
-
CR - Code review
- Manual and expensive
-
Consider automated alternatives (SAST)
-
T - Training programs
- Extensive training doesn't scale
-
Consider self-service documentation instead
-
PT - Penetration testing
- Expensive and point-in-time
- Consider continuous automated testing instead
Contextual Modifiers and BSIMM¶
High Attack Landscape Maturity¶
Impact: Prioritizes defensive BSIMM activities - CMVM becomes top priority (automated vulnerability management) - ST must be automated (manual testing too slow) - PT less valuable (adversaries find issues faster than annual pentests)
High Regulatory Constraints¶
Impact: Forces governance BSIMM activities - CP (Compliance & Policy) becomes mandatory - SM (Strategy & Metrics) needed for evidence - T (Training) required for compliance - May require activities that don't reduce actual risk
Low Relationship Health¶
Impact: Limits collaborative BSIMM activities - AA, CR, PT difficult (require engineering cooperation) - Must focus on automated activities (CMVM, ST, SE) - Relationship building becomes prerequisite for manual BSIMM activities
Practical Integration Example¶
Scenario: Challenger Position Enterprise¶
Current State: - Attempting comprehensive BSIMM implementation - Following industry BSIMM scores - Overwhelming security team with 112 activities
Traditional BSIMM Approach: - Implement all activities where industry shows high adoption - Progress through BSIMM levels systematically - Benchmark against similar organizations
SF²-Informed Approach:
Year 1: Stabilization - CMVM automation (Supply Chain #1) - SE for new systems (secure build) - Basic ST (automated security testing) - Skip: AA, CR, PT, extensive T programs
Year 2-3: Hybrid Build-out - New systems: Comprehensive BSIMM (automation-focused) - Legacy: CMVM only (vulnerability management) - Relationship building: Enable collaborative activities (AA, CR) over time
Year 4-5: Comprehensive Coverage - Full BSIMM for modernized systems - Retire legacy activities as systems sunset - Optimize: Eliminate low-value activities
Outcome: Achievable BSIMM implementation aligned with transformation timeline
BSIMM Activity Decision Matrix¶
Your SF² Position | BSIMM Activity Count | Implementation Focus | Automation Level |
---|---|---|---|
Visionaries | 30-40 activities | Automation-friendly activities | Very high |
Leaders | 60-80 activities | Comprehensive with efficiency | High |
Niche Players | 15-25 activities | Essential only | Managed services |
Challengers | 30-40 (new systems only) | Hybrid approach | Mixed |
Note: These are guidelines, not targets. More BSIMM activities doesn't necessarily mean better security.
Key Takeaways¶
Use BSIMM for: - Comprehensive catalog of security activities - Understanding what other organizations do - Benchmarking your security program - Identifying potential activity gaps
Use SF² for: - Prioritizing which BSIMM activities to implement - Sequencing BSIMM activity adoption - Determining automation vs manual implementation - Deciding which BSIMM activities to skip entirely
Together: - BSIMM provides the activity catalog - SF² provides the strategic prioritization framework - Result: Focused security program aligned with organizational reality
Critical Insight: More BSIMM activities doesn't equal better security. SF² helps you implement the right BSIMM activities for your organization, not the most activities.
Next Steps¶
Continue to OWASP ASVS Relationship Back to OWASP SAMM Relationship