⭐ Repository → 💼 APRA CPG 234 → 💼 Attachment D - Software security → 💼 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider include:
💼 a. requirements — information security requirements would be explicitly identified as part of the requirements definition of the software and address potential threats;
- ID:
/frameworks/apra-cpg-234/d/2/a
Description
Empty...
Similar
- Internal
- ID:
dec-c-d55c5f73
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|