Skip to main content

๐Ÿ’ผ 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider

include:

  • Contextual name: ๐Ÿ’ผ 2 Ongoing security of existing software would also typically be considered as part of change management and as new vulnerabilities are identified. Typical factors to consider include:
  • ID: /frameworks/apra-cpg-234/d/2
  • Located in: ๐Ÿ’ผ Attachment D - Software security

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-20a8f621

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ a. requirements โ€” information security requirements would be explicitly identified as part of the requirements definition of the software and address potential threats;
๐Ÿ’ผ b. design โ€” considerations when designing secure software could include software modularisation; where on the network the software is located; what privileges the software executes under; inclusion of information security features as part of the technical specifications; and the information security standards and guidelines the software specifications are written to;
๐Ÿ’ผ c. selection and configuration โ€” considerations when selecting and configuring vendor supplied software include due diligence as to the security testing conducted to identify vulnerabilities (either intended or deliberate); user access management capabilities (e.g. role based, support of segregation of duties); interface vulnerabilities; monitoring capabilities; encryption capabilities to protect sensitive data; ability to obtain and implement information security updates in a timely manner; compliance with the security policy framework; and configuration/implementation of the software which minimises the risk of a security compromise;
๐Ÿ’ผ d. standards and guidelines โ€” the body of knowledge for developing secure software would typically be embodied in a set of standards and guidelines. Typically, standards would exist for each programming language, taking into account known vulnerabilities and what is considered to be good practice. It is important that standards remain aligned with industry developments such as emerging vulnerabilities/threats and associated compensating controls. In developing software standards and guidelines, consideration would typically be given to:4
ย ย ย ย ๐Ÿ’ผ i. common software requirements such as authentication, authorisation, session management, data validation, cryptography, logging, configuration, auditing, deployment and maintenance;
ย ย ย ย ๐Ÿ’ผ ii. techniques for addressing common weaknesses such as poor exception and error handling; weak file and group permissions; use and storage of temporary files; unnecessary code; insecure system calls; poor password handling; and susceptibility to buffer overflow, code insertion and resource (e.g. memory) leakage;
ย ย ย ย ๐Ÿ’ผ iii. software defence techniques against known vulnerabilities;
ย ย ย ย ๐Ÿ’ผ iv. approaches for secure input/output handling.