Establish and Maintain a Secure Application Development Process
A5.8 Information security in project management A8.4 Access to source code A8.25 Secure development life cycle Establish and Maintain a Process to Accept and Address Software Vulnerabilities
A8.8 Management of technical vulnerabilities Perform Root Cause Analysis on Security Vulnerabilities
A8.8 Management of technical vulnerabilities Establish and Manage an Inventory of Third-Party Software Components
A8.26 Application security requirements A8.30 Outsourced development Use Up-to-Date and Trusted Third-Party Software Components
A8.26 Application security requirements Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities
A8.8 Management of technical vulnerabilities Use Standard Hardening Configuration Templates for Application Infrastructure
A8.8 Management of technical vulnerabilities Separate Production and Non-Production Systems
A8.31 Separation of development, test and production environments Train Developers in Application Security Concepts and Secure Coding
Apply Secure Design Principles in Application Architectures
A8.27 Secure system architecture and engineering principles Leverage Vetted Modules or Services for Application Security Components
A8.25 Secure development life cycle A8.26 Application security requirements Implement Code-Level Security Checks
A8.25 Secure development life cycle A8.29 Security testing in development and acceptance Conduct Application Penetration Testing
A8.8 Management of technical vulnerabilities A8.29 Security testing in development and acceptance Conduct Threat Modeling
A8.29 Security testing in development and acceptance