💼 b. design — considerations when designing secure software could include software modularisation; where on the network the software is located; what privileges the software executes under; inclusion of information security features as part of the technical specifications; and the information security standards and guidelines the software specifications are written to;
- ID:
/frameworks/apra-cpg-234/d/2/b
Description​
Empty...
Similar​
- Internal
- ID:
dec-c-21e0c310
- ID:
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|