From Application Security and Development Security Technical Implementation Guide
Part of ASDV-PL-003220
Associated with: CCI-003233
This requirement is meant to apply to developers or organizations that are doing application development work.
This requirement is meant to apply to developers or organizations that are doing application development work. If the organization operating the application is not doing the development or managing the development of the application, the requirement is not applicable. Ask the application representative for the design document for the application. Review the design document. Examine the design document and/or the threat model for the application and verify the following information is documented: - All external interfaces. - The nature of information being exchanged - Any protections on the external interface - User roles required for access control and the access privileges assigned to each role - Unique security requirements (e.g., encryption of key data elements at rest) - Categories of sensitive information processed by the application and their specific protection plans (e.g., PII, HIPAA). - Restoration priority of subsystems, processes, or information - Verify the organization includes documentation describing the design and implementation details of the security controls employed within the information system with sufficient detail - Application incident response plan that provides details on how to provide the development team with application vulnerability or bug information. If the design document is incomplete, this is a finding.
Create and maintain the Design Document for each release of the application and identify the following: - All external interfaces (from the threat model) - The nature of information being exchanged - Categories of sensitive information processed or stored and their specific protection plans - The protection mechanisms associated with each interface - User roles required for access control - Access privileges assigned to each role - Unique application security requirements - Categories of sensitive information processed or stored and specific protection plans (e.g., Privacy Act, HIPAA, etc.) - Restoration priority of subsystems, processes, or information.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer