Skip to content
Policy Acceptance Template
  • Pages
    • Welcome!
    • Live Policies
      • Acceptable Use Policy
      • Access Control Policy
      • Asset Management Policy
      • Backup Policy
      • Business Continuity and Disaster Recovery Policy
      • Change Management Policy
      • Code of Conduct
      • Data Classification and Handling Policy
      • Data Protection Policy
      • Data Retention and Deletion Policy
      • Encryption & Key Management Policy
      • Exception and Enforcement Policy
      • Incident Response Policy
      • Information Security Policy
      • Internal Security Audit Policy
      • Network Security Policy
      • Password Policy
      • Physical Security Policy
      • Responsible Disclosure Policy
      • Risk Management Policy
      • icon picker
        Secure Development Policy
      • Vendor Management Policy
      • Vulnerability Management & Patch Policy
      • Wireless Communication Policy
    • Admin
      • Policy Compliance
      • Acceptance Log
      • Live Policies Admin View
      • Policy Changelog
      • Template Policy

Secure Development Policy

Overview

Purpose:
The purpose of this policy is to establish guidelines and best practices for secure software development within our organization. This policy applies to all software development activities, including in-house development, outsourced development, and third-party software acquisition.
Policy:
Security shall be integrated into the software development process from the outset.
A security review shall be conducted at every stage of the software development life cycle (SDLC), including design, coding, testing, and deployment.
All software shall be designed and developed with security in mind. Security requirements shall be explicitly defined and documented in the requirements specification.
All software shall be tested for security vulnerabilities, including but not limited to:
a. Buffer overflows
b. Injection flaws
c. Cross-site scripting (XSS)
d. Broken authentication and session management
e. Insufficient logging and monitoring
Security testing shall be conducted using both manual and automated methods.
Any security vulnerabilities identified during testing shall be remediated prior to deployment.

Revision History

Date of Change
Policy
Notes
1/31/2022
Create Secure Development Policy.
No results from filter

Accept

Secure Development Policy 1.1
By clicking this button I acknowledge that I have read the above policy and agree to comply with the policy
No results from filter


Revision and acceptance filter:
DO NOT CHANGE


 
Want to print your doc?
This is not the way.
Try clicking the ··· in the right corner or using a keyboard shortcut (
CtrlP
) instead.