Skip to main content

Repository → 💼 APRA CPG 234 → 💼 Attachment D - Software security → 💼 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider include:

💼 a. requirements — information security requirements would be explicitly identified as part of the requirements definition of the software and address potential threats;

  • ID: /frameworks/apra-cpg-234/d/2/a

Description

Empty...

Similar

  • Internal
    • ID: dec-c-d55c5f73

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance