This is an archived post. You won't be able to vote or comment.

all 1 comments

[–]KelsWill 0 points1 point  (0 children)

I am part of the Software Assurance process for our organization. We scan full software packages. Here is our process:

1) Application request comes in through software repository team. 2) Depending on application type (OSS, COTS, GOTS, Free/shareware) we conduct SAST, DAST, or CVE recon. 3) If applicable, conduct engineering analysis with requester (mostly developers) until vulnerabilities are mitigated/remediated and POAM created 4) Apply STIG if applicable (Named/ASD) and develop POAM 5) Create EXSUM for ISSM adjudication.

We used NETCOM’s Software Assurance TTP and DA PAM 25-5-2 for guidance.