Software listed
1
Software Described
Role of the software in business process is described. The problem that software solves is clearly defined.
2
Ownership defined
Person in charge is defined.
3
List of thirdparty components/libs defined.
Thirdparty components maintained
Security feeds of thirdparty components monitored
4
Software attack surface defined and mitigation measures implemented
5
Secure configuration is defined
6
Source code and configuration stored in VCS with authenticated and authorized access.
Malicious software (malware) is software or firmware designed to infiltrate or damage a computer system without the owner's knowledge or consent, with the intent of compromising the confidentiality, integrity, or availability of the owner’s data, applications, or operating system
Last updated