OWASP SAMM Self-Assessment Example Report

Illustrative sample report based on the public OWASP SAMM model
Illustrative overall indicator
2.18/3.0
This page is a sample report layout that can be adapted for internal self-assessment. It is intentionally written in a board-friendly style with concise observations, prioritized actions, and evidence-oriented language.

Strengths

Gaps

Top priorities

  1. Expand mandatory threat modeling and security requirements traceability.
  2. Standardize release-security sign-off and evidence retention.
  3. Introduce runtime investigation playbooks and measurable remediation SLAs.

Practice view

Business FunctionPracticeExample ScoreIllustrative Observation
GovernanceStrategy & Metrics2.40Central KPIs exist but targets are inconsistent across business units.
GovernancePolicy & Compliance2.10Strong baseline policies, limited automated evidence collection.
GovernanceEducation & Guidance1.80Secure coding guidance exists; role-based coaching is uneven.
DesignThreat Assessment2.00Threat modeling is required for Tier-1 services only.
DesignSecurity Requirements2.30Requirements are captured, but traceability to backlog is partial.
DesignSecure Architecture2.20Architecture reviews occur for material changes; API review coverage can improve.
ImplementationSecure Build2.50Branch protection and CI policies are mature; attestations not universal.
ImplementationDefect Management2.10Findings flow is operational, aging and exceptions need tighter governance.
ImplementationSecure Deployment2.00Pre-prod controls are present; release approval evidence is fragmented.
VerificationDesign Review1.90Manual design review coverage is below target for critical products.
VerificationCode Review2.40Peer review is mature; security-specific review heuristics vary by team.
VerificationSecurity Testing2.30SAST/SCA/DAST are integrated; business logic testing is inconsistent.
OperationsIncident Management2.20PSIRT path exists, but product-specific playbooks are incomplete.
OperationsEnvironment Management2.40Cloud posture and Kubernetes baseline controls are in place.
OperationsOperational Management2.10Runtime telemetry exists; ownership of response evidence needs clarity.

References