Software listed

1

Software Described

Role of the software in business process is described. The problem that software solves is clearly defined.

2

Ownership defined

Person in charge is defined.

3

List of thirdparty components/libs defined.

Thirdparty components maintained

Security feeds of thirdparty components monitored

4

Software attack surface defined and mitigation measures implemented

5

Secure configuration is defined

6

Source code and configuration stored in VCS with authenticated and authorized access.

Malicious software (malware) is software or firmware designed to infiltrate or damage a computer system without the owner's knowledge or consent, with the intent of compromising the confidentiality, integrity, or availability of the owner’s data, applications, or operating system

Last updated