SA-11(6)—Developer Security Testing
>Control Description
>Supplemental Guidance
Attack surfaces of information systems are exposed areas that make those systems more vulnerable to cyber-attacks. This includes any accessible areas where weaknesses or deficiencies in information systems (including the hardware, software, and firmware components) provide opportunities for adversaries to exploit vulnerabilities. Attack surface reviews ensure that developers: (i) analyze both design and implementation changes to information systems; and (ii) mitigate attack vectors generated as a result of the changes.
Correction of identified flaws includes, for example, deprecation of unsafe functions.
>Tailoring Guidance
Apply to boundary and other security critical components. For COTS products require 3rd party evaluation such as Common Criteria.
Ask AI
Configure your API key to use AI features.