| 💼 A.14.1 Security requirements of information systems | 3 | 16 | 21 | | no data |
|  💼 A.14.1.1 Information security requirements analysis and specification | | 6 | 6 | | no data |
|  💼 A.14.1.2 Securing application services on public networks | | 5 | 5 | | no data |
|  💼 A.14.1.3 Protecting application services transactions | | 10 | 15 | | no data |
| 💼 A.14.2 Security in development and support processes | 9 | | | | no data |
|  💼 A.14.2.1 Secure development policy | | | | | no data |
|  💼 A.14.2.2 System change control procedures | | | | | no data |
|  💼 A.14.2.3 Technical review of applications after operating platform changes | | | | | no data |
|  💼 A.14.2.4 Restrictions on changes to software packages | | | | | no data |
|  💼 A.14.2.5 Secure system engineering principles | | | | | no data |
|  💼 A.14.2.6 Secure development environment | | | | | no data |
|  💼 A.14.2.7 Outsourced development | | | | | no data |
|  💼 A.14.2.8 System security testing | | | | | no data |
|  💼 A.14.2.9 System acceptance testing | | | | | no data |
| 💼 A.14.3 Test data | 1 | | | | no data |
|  💼 A.14.3.1 Protection of test data | | | | | no data |