Skip to main content

💼 SA-11(1) Static Code Analysis (M)(H)

  • ID: /frameworks/fedramp-moderate-security-controls/sa/11/01

Description

Require the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.

SA-11(1) Additional FedRAMP Requirements:

Requirement: The service provider must document its methodology for reviewing newly developed code for the Service in its Continuous Monitoring Plan.

If Static code analysis cannot be performed (for example, when the source code is not available), then dynamic code analysis must be performed (see SA-11 (8)).

Similar

  • Sections
    • /frameworks/fedramp-high-security-controls/sa/11/01
  • Internal
    • ID: dec-c-8509c279

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 SA-11(1) Static Code Analysis (M)(H)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS GuardDuty is not enabled in all regions🟢1🟢 x6no data