PW.1.3—Where appropriate, build in support for using standardized security features and services (e.g., enabling software to integrate with existing log management, identity management, access control, and vulnerability management systems) instead of creating proprietary implementations of security features and services. [Formerly PW.4.3]
PW.1
>Control Description
Where appropriate, build in support for using standardized security features and services (e.g., enabling software to integrate with existing log management, identity management, access control, and vulnerability management systems) instead of creating proprietary implementations of security features and services. [Formerly PW.4.3]
>Practice: PW.1
Design Software to Meet Security Requirements and Mitigate Security Risks
Identify and evaluate the security requirements for the software; determine what security risks the software is likely to face during operation and how the software’s design and architecture should mitigate those risks; and justify any cases where risk-based analysis indicates that security requirements should be relaxed or waived. Addressing security requirements and risks during software design (secure by design) is key for improving software security and also helps improve development efficiency.
>Notional Implementation Examples
- 1.Maintain one or more software repositories of modules for supporting standardized security features and services.
- 2.Determine secure configurations for modules for supporting standardized security features and services, and make these configurations available (e.g., as configuration-as-code) so developers can readily use them.
- 3.Define criteria for which security features and services must be supported by software to be developed.
>Cross-Framework References
Mappings to related frameworks and standards from NIST SP 800-218
BSA FSS
SI.2-1
SI.2-2
LO.1
BSIMM
SFD1.1
SFD2.1
SFD3.2
SR1.1
SR3.4
EO 14028
4e(ix)
IEC 62443
SD-1
SD-4
Microsoft SDL
5
OWASP ASVS
1.1.6
OWASP SAMM
SA2-A
SAFECode FPSSD
Standardize Identity and Access Management
Establish Log Requirements and Audit Practices
Ask AI
Configure your API key to use AI features.