Under active development Content is continuously updated and improved

PO.4.1Define criteria for software security checks and track throughout the SDLC.

PO.4

>Control Description

Define criteria for software security checks and track throughout the SDLC.

>Practice: PO.4

Define and Use Criteria for Software Security Checks

Help ensure that the software resulting from the SDLC meets the organization’s expectations by defining and using criteria for checking the software’s security during development.

>Notional Implementation Examples

  1. 1.Ensure that the criteria adequately indicate how effectively security risk is being managed.
  2. 2.Define key performance indicators (KPIs), key risk indicators (KRIs), vulnerability severity scores, and other measures for software security.
  3. 3.Add software security criteria to existing checks (e.g., the Definition of Done in agile SDLC methodologies).
  4. 4.Review the artifacts generated as part of the software development workflow system to determine if they meet the criteria.
  5. 5.Record security check approvals, rejections, and exception requests as part of the workflow and tracking system.
  6. 6.Analyze collected data in the context of the security successes and failures of each development project, and use the results to improve the SDLC.

>Cross-Framework References

Mappings to related frameworks and standards from NIST SP 800-218

BSA FSS

TV.2-1
TV.5-1

BSIMM

SM1.4
SM2.1
SM2.2
SM2.6
SM3.3
CP2.2

EO 14028

4e(iv)
4e(v)
4e(ix)

IEC 62443

SI-1
SI-2
SVV-3

ISO 27034

7.3.5

Microsoft SDL

3

OWASP SAMM

PC3-A
DR3-B
IR3-B
ST3-B

PCI SSLC

3.3

SP 800-53

SP 800-160

3.2.1
3.2.5
3.3.1

SP 800-161

SA-15
SA-15(1)

SP 800-181 (NICE)

K0153
K0165

Ask AI

Configure your API key to use AI features.