Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
SA-15 | Development Process, Standards, And Tools | HIGH | P2 | System And Services Acquisition |
Instructions |
---|
The organization: SA-15a. Requires the developer of the information system, system component, or information system service to follow a documented development process that: SA-15a.1. Explicitly addresses security requirements; SA-15a.2. Identifies the standards and tools used in the development process; SA-15a.3. Documents the specific tool options and tool configurations used in the development process; and SA-15a.4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and SA-15b. Reviews the development process, standards, tools, and tool options/configurations Assignment: organization-defined frequency to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy Assignment: organization-defined security requirements. |
Guidance |
---|
Development tools include, for example, programming languages and computer-aided design (CAD) systems. Reviews of development processes can include, for example, the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes enables accurate supply chain risk assessment and mitigation, and requires robust configuration control throughout the life cycle (including design, development, transport, delivery, integration, and maintenance) to track authorized changes and prevent unauthorized changes. |
Enhancements | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The organization requires the developer of the information system, system component, or information system service to: SA-15 (1)(a)Define quality metrics at the beginning of the development process; and SA-15 (1)(b)Provide evidence of meeting the quality metrics Selection (one or more): Assignment: organization-defined frequency; Assignment: organization-defined program review milestones; upon delivery.
The organization requires the developer of the information system, system component, or information system service to select and employ a security tracking tool for use during the development process.
The organization requires the developer of the information system, system component, or information system service to perform a criticality analysis at Assignment: organization-defined breadth/depth and at Assignment: organization-defined decision points in the system development life cycle.
The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at Assignment: organization-defined breadth/depth that: SA-15 (4)(a)Uses Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels; SA-15 (4)(b)Employs Assignment: organization-defined tools and methods; and SA-15 (4)(c)Produces evidence that meets Assignment: organization-defined acceptance criteria.
The organization requires the developer of the information system, system component, or information system service to reduce attack surfaces to Assignment: organization-defined thresholds.
The organization requires the developer of the information system, system component, or information system service to implement an explicit process to continuously improve the development process.
The organization requires the developer of the information system, system component, or information system service to: SA-15 (7)(a)Perform an automated vulnerability analysis using Assignment: organization-defined tools; SA-15 (7)(b)Determine the exploitation potential for discovered vulnerabilities; SA-15 (7)(c)Determine potential risk mitigations for delivered vulnerabilities; and SA-15 (7)(d)Deliver the outputs of the tools and results of the analysis to Assignment: organization-defined personnel or roles.
The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
The organization approves, documents, and controls the use of live data in development and test environments for the information system, system component, or information system service.
The organization requires the developer of the information system, system component, or information system service to provide an incident response plan.
The organization requires the developer of the information system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security review. |