Skip to main content

๐Ÿ’ผ 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.

  • ID: /frameworks/pci-dss-v4.0/06/02/04

Descriptionโ€‹

including but not limited to the following:

  • Injection attacks, including SQL, LDAP, XPath, or other command, parameter, object, fault, or injection-type flaws.
  • Attacks on data and data structures, including attempts to manipulate buffers, pointers, input data, or shared data.
  • Attacks on cryptography usage, including attempts to exploit weak, insecure, or inappropriate cryptographic implementations, algorithms, cipher suites, or modes of operation.
  • Attacks on business logic, including attempts to abuse or bypass application features and functionalities through the manipulation of APIs, communication protocols and channels, client-side functionality, or other system/application functions and resources. This includes cross-site scripting (XSS) and cross-site request forgery (CSRF).
  • Attacks on access control mechanisms, including attempts to bypass or abuse identification, authentication, or authorization mechanisms, or attempts to exploit weaknesses in the implementation of such mechanisms.
  • Attacks via any โ€œhigh-riskโ€ vulnerabilities identified in the vulnerability identification process, as defined in Requirement 6.3.1.

Similarโ€‹

  • Sections
    • /frameworks/pci-dss-v4.0.1/06/02/04
    • /frameworks/pci-dss-v3.2.1/06/05/01
    • /frameworks/pci-dss-v3.2.1/06/05/02
    • /frameworks/pci-dss-v3.2.1/06/05/03
    • /frameworks/pci-dss-v3.2.1/06/05/04
    • /frameworks/pci-dss-v3.2.1/06/05/05
    • /frameworks/pci-dss-v3.2.1/06/05/06
    • /frameworks/pci-dss-v3.2.1/06/05/07
    • /frameworks/pci-dss-v3.2.1/06/05/08
    • /frameworks/pci-dss-v3.2.1/06/05/09
    • /frameworks/pci-dss-v3.2.1/06/05/10
  • Internal
    • ID: dec-c-83bf5577

Similar Sections (Take Policies From)โ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.1 Injection flaws, particularly SQL injection. Also consider OS Command Injection, LDAP and XPath injection flaws as well as other injection flaws.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.2 Buffer overflows.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.3 Insecure cryptographic storage.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.4 Insecure communications.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.5 Improper error handling.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.6 All โ€œhigh riskโ€ vulnerabilities identified in the vulnerability identification process.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.7 Cross-site scripting (XSS).1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.8 Improper access control.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.9 Cross-site request forgery (CSRF).1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.10 Broken authentication and session management.1no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.1no data

Similar Sections (Give Policies To)โ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.1 Injection flaws, particularly SQL injection. Also consider OS Command Injection, LDAP and XPath injection flaws as well as other injection flaws.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.2 Buffer overflows.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.3 Insecure cryptographic storage.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.4 Insecure communications.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.5 Improper error handling.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.6 All โ€œhigh riskโ€ vulnerabilities identified in the vulnerability identification process.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.7 Cross-site scripting (XSS).1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.8 Improper access control.1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.9 Cross-site request forgery (CSRF).1no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.5.10 Broken authentication and session management.1no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 6.2.4 Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.1no data

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)โ€‹

PolicyLogic CountFlagsCompliance
๐Ÿ›ก๏ธ AWS ECR Repository Manual Scanning is enabled๐ŸŸข1๐ŸŸข x6no data