Under active development Content is continuously updated and improved

16.5Use Up-to-Date and Trusted Third-Party Software Components

IG2
IG3
Software
Protect

>Control Description

Use up-to-date and trusted third-party software components. When possible, choose established and proven frameworks and libraries that provide adequate security. Acquire these components from trusted sources or evaluate the software for vulnerabilities before use.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.