Skip to main content

πŸ’Ό 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.

  • ID: /frameworks/pci-dss-v4.0.1/06/02/04

Description​

Including but not limited to the following:

  • Injection attacks, including SQL, LDAP, XPath, or other command, parameter, object, fault, or injection-type flaws.
  • Attacks on data and data structures, including attempts to manipulate buffers, pointers, input data, or shared data.
  • Attacks on cryptography usage, including attempts to exploit weak, insecure, or inappropriate cryptographic implementations, algorithms, cipher suites, or modes of operation.
  • Attacks on business logic, including attempts to abuse or bypass application features and functionalities through the manipulation of APIs, communication protocols and channels, client-side functionality, or other system/application functions and resources. This includes cross-site scripting (XSS) and cross-site request forgery (CSRF).
  • Attacks on access control mechanisms, including attempts to bypass or abuse identification, authentication, or authorization mechanisms, or attempts to exploit weaknesses in the implementation of such mechanisms.
  • Attacks via any β€œhigh-risk” vulnerabilities identified in the vulnerability identification process, as defined in Requirement 6.3.1.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/06/02/04
    • /frameworks/aws-fsbp-v1.0.0/ecr/01
    • /frameworks/aws-fsbp-v1.0.0/elb/04
    • /frameworks/aws-fsbp-v1.0.0/elb/12
    • /frameworks/aws-fsbp-v1.0.0/elb/14
    • /frameworks/aws-fsbp-v1.0.0/inspector/03
    • /frameworks/aws-fsbp-v1.0.0/inspector/04

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ECR.1] ECR private repositories should have image scanning configured11no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.4] Application Load Balancer should be configured to drop invalid http headers1no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.12] Application Load Balancer should be configured with defensive or strictest desync mitigation mode1no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.14] Classic Load Balancer should be configured with defensive or strictest desync mitigation mode1no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.3] Amazon Inspector Lambda code scanning should be enabled1no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.4] Amazon Inspector Lambda standard scanning should be enabled1no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.5no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.5no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (5)​

PolicyLogic CountFlagsCompliance
πŸ›‘οΈ AWS ECR Repository Manual Scanning is enabled🟒1🟒 x6no data
πŸ›‘οΈ AWS ELB Application Load Balancer is not configured to drop invalid HTTP headers🟒1🟒 x6no data
πŸ›‘οΈ AWS ELB Load Balancer is not configured with defensive or strictest desync mitigation mode🟒1🟒 x6no data
πŸ›‘οΈ AWS Inspector Lambda Code Scanning is not enabled🟒1🟒 x6no data
πŸ›‘οΈ AWS Inspector Lambda Standard Scanning is not enabled🟒1🟒 x6no data