💼 6.3 Develop internal and external software applications securely.
- Contextual name: 💼 6.3 Develop internal and external software applications securely.
- ID:
/frameworks/pci-dss-v3.2.1/06/03
- Located in: 💼 6 Develop and maintain secure systems and applications
Description
As follows:
- In accordance with PCI DSS (for example, secure authentication and logging)
- Based on industry standards and/or best practices.
- Incorporating information security throughout the software-development life cycle.
This applies to all software developed internally as well as bespoke or custom software developed by a third party.
Similar
- Sections
/frameworks/pci-dss-v4.0/06/02/01
- Internal
- ID:
dec-c-ec8dbb6f
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 6.2.1 Bespoke and custom software are developed securely. | 3 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 6.2.1 Bespoke and custom software are developed securely. | 3 |
Sub Sections
Policies (3)
Policy | Logic Count | Flags |
---|---|---|
📝 Google API Key is not restricted for unused APIs 🟢 | 1 | 🟢 x6 |
📝 Google API Key is not rotated every 90 days 🟢 | 1 | 🟢 x6 |
📝 Google Project has API Keys 🟢 | 1 | 🟠 x1, 🟢 x5 |