๐ผ 6.5 Address common coding vulnerabilities in software-development processes.
-
Contextual name: ๐ผ 6.5 Address common coding vulnerabilities in software-development processes.
-
ID:
/frameworks/pci-dss-v3.2.1/06/05
-
Located in: ๐ผ 6 Develop and maintain secure systems and applications
Descriptionโ
As follows:
- Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities.
- Develop applications based on secure coding guidelines.
The vulnerabilities listed at 6.5.1 through 6.5.10 were current with industry best practices when this version of PCI DSS was published. However, as industry best practices for vulnerability management are updated (for example, the OWASPGuide, SANS CWE Top 25, CERT Secure Coding, etc.), the current best practices must be used for these requirements.
Similarโ
- Sections
/frameworks/pci-dss-v4.0/06/02/02
- Internal
- ID:
dec-c-61590095
- ID:
Similar Sections (Take Policies From)โ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
๐ผ PCI DSS v4.0 โ ๐ผ 6.2.2 Software development personnel working on bespoke and custom software are trained at least once every 12 months. |
Similar Sections (Give Policies To)โ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
๐ผ PCI DSS v4.0 โ ๐ผ 6.2.2 Software development personnel working on bespoke and custom software are trained at least once every 12 months. |