Skip to main content

💼 b. design — considerations when designing secure software could include software modularisation; where on the network the software is located; what privileges the software executes under; inclusion of information security features as part of the technical specifications; and the information security standards and guidelines the software specifications are written to;

  • ID: /frameworks/apra-cpg-234/d/2/b

Description​

Empty...

Similar​

  • Internal
    • ID: dec-c-21e0c310

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance