⭐ Repository → 💼 APRA CPG 234 → 💼 Attachment D - Software security → 💼 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider include:
💼 b. design — considerations when designing secure software could include software modularisation; where on the network the software is located; what privileges the software executes under; inclusion of information security features as part of the technical specifications; and the information security standards and guidelines the software specifications are written to;
- ID:
/frameworks/apra-cpg-234/d/2/b
Description
Empty...
Similar
- Internal
- ID:
dec-c-21e0c310
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|