Skip to main content

Repository → 💼 APRA CPG 234 → 💼 Attachment D - Software security → 💼 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider include:

💼 b. design — considerations when designing secure software could include software modularisation; where on the network the software is located; what privileges the software executes under; inclusion of information security features as part of the technical specifications; and the information security standards and guidelines the software specifications are written to;

  • ID: /frameworks/apra-cpg-234/d/2/b

Description

Empty...

Similar

  • Internal
    • ID: dec-c-21e0c310

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance