[ISM] Access control:

Unauthorised access to the authoritative source for software is prevented.

[SSDF] Establish comprehensive access control criteria (SSS-01-04-01)

Establish comprehensive security criteria for software checks to enable robust and consistent access control throughout the Software Development Life Cycle (SDLC). These criteria should define clear policies and procedures for access management, ensuring that only authorized individuals and processes can interact with software components at every stage of development, testing, deployment, and maintenance. Additionally, conduct thorough reviews and evaluations, confirm secure configurations, verify the origin and authenticity of components, and establish controlled repositories. Maintain an approved list of trusted components, designate essential components, implement stringent update processes, and build binaries directly from source code when necessary to prevent the use of unauthorized or insecure components.

[SSDF] Implement security criteria integration and evaluation (SSS-01-04-01-01)

Define measurable security metrics, such as KPIs, KRIs, and vulnerability severity scores, to assess risk management. Embed these criteria into SDLC workflows, like Agile's "Definition of Done" or CI/CD checks. Review artifacts to ensure compliance with benchmarks and track outcomes (approvals, rejections, exceptions) in a centralized system. Analyze collected data to refine security practices and adapt criteria to evolving risks, ensuring a secure and consistent development process.

Operations

ID Operation Description Phase Agent
SSS-01-04-01-01-01 Define security metrics and criteria Establish clear metrics, such as KPIs, KRIs, and vulnerability severity scores, to measure the effectiveness of software security risk management. Ensure these metrics provide meaningful insights into security risk management. Preparation Security Teams, Risk Management Teams
SSS-01-04-01-01-02 Integrate security criteria into development workflows Add software security criteria to existing workflows, such as the Definition of Done in agile SDLC methodologies. Ensure that security checks are an integral part of the software development lifecycle and align with project goals. Development Development Teams, Security Teams
SSS-01-04-01-01-03 validate artifacts against security criteria Review artifacts generated during the software development workflow (e.g., code reviews, test results, documentation) to verify they meet established security criteria. Record approvals, rejections, and exceptions as part of the workflow tracking system. Deployment Quality Assurance Teams, Security Analysts
SSS-01-04-01-01-04 Analyze security data for continuous improvement Collect and analyze data from security checks, including successes, failures, and exception requests, to evaluate the overall effectiveness of security measures. Use the insights gained to refine the SDLC and enhance future security practices. Post-deployment Security Teams, Risk Management Teams
SSS-01-04-01-01-05 Track and report security check outcomes Maintain a record of security check outcomes, including approvals, rejections, and exception requests, within the tracking system. Use these records for reporting, auditing, and identifying areas for improvement in the software development process. Post-deployment Security Teams, Compliance Teams

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1422)
NIST Secure Software Development Framework (PO.4.1)
SSDF (PO.4.1: Define criteria for software security checks and track throughout the SDLC. - Example)

[SAMM] Perform vendor assessments (SSS-01-04-01-02)

Conduct comprehensive vendor assessments to ensure that external suppliers involved in software development align with the organization’s security standards and risk appetite. Use structured approaches, such as checklists, interviews, or maturity evaluations, to evaluate suppliers’ security practices, processes, and software assurance programs. Assess their ability to address potential risks and ensure alignment with your organization’s access control and security requirements across the SDLC. If gaps in security capabilities are identified, collaborate with suppliers to address these issues and evaluate their plans for improvement. Make security expectations explicit, provide clear guidelines, and regularly reassess supplier performance to account for changing risk factors. This ensures that external suppliers do not introduce vulnerabilities into the development process and supports a secure and consistent SDLC.

Operations

ID Operation Description Phase Agent
SSS-01-04-01-02-01 Establish vendor evaluation criteria Define evaluation criteria based on organizational security needs and risk appetite. Use a basic checklist or conduct interviews to review their typical practices and deliveries. Preparation Procurement team, Security team, Project leads
SSS-01-04-01-02-02 Conduct vendor assessments Perform assessments using interviews or questionnaires with different roles in the organization. Evaluate their practices, deliveries, and software assurance processes. Include a maturity evaluation where needed. Development Security team, Vendor managers
SSS-01-04-01-02-03 Document and prioritize identified risks If suppliers have weak competences in software security, record vendor security risks, categorize them based on severity, and determine which risks require immediate mitigation or long-term monitoring. Development Security team, Procurement team, Vendors
SSS-01-04-01-02-04 Communicate expectations and monitor alignment Clearly communicate expectations to suppliers and monitor their compliance. Reassess periodically for critical or evolving projects. Post-deployment Procurement team, Security team, Project leads

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1422)
NIST Secure Software Development Framework (PO.4.1)
OWASP SAMM: Software Assurance Maturity Model (D-SR-1-B)