Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
SA-17 | Developer Security Architecture And Design | HIGH | P1 | System And Services Acquisition |
Instructions |
---|
The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that: SA-17a. Is consistent with and supportive of the organization�s security architecture which is established within and is an integrated part of the organization�s enterprise architecture; SA-17b. Accurately and completely describes the required security functionality, and the allocation of security controls among physical and logical components; and SA-17c. Expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection. |
Guidance |
---|
This control is primarily directed at external developers, although it could also be used for internal (in-house) development. In contrast, PL-8 is primarily directed at internal developers to help ensure that organizations develop an information security architecture and such security architecture is integrated or tightly coupled to the enterprise architecture. This distinction is important if/when organizations outsource the development of information systems, information system components, or information system services to external entities, and there is a requirement to demonstrate consistency with the organization�s enterprise architecture and information security architecture. |
Enhancements | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The organization requires the developer of the information system, system component, or information system service to: SA-17 (1)(a)Produce, as an integral part of the development process, a formal policy model describing the Assignment: organization-defined elements of organizational security policy to be enforced; and SA-17 (1)(b)Prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security policy when implemented.
The organization requires the developer of the information system, system component, or information system service to: SA-17 (2)(a)Define security-relevant hardware, software, and firmware; and SA-17 (2)(b)Provide a rationale that the definition for security-relevant hardware, software, and firmware is complete.
The organization requires the developer of the information system, system component, or information system service to: SA-17 (3)(a)Produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects; SA-17 (3)(b)Show via proof to the extent feasible with additional informal demonstration as necessary, that the formal top-level specification is consistent with the formal policy model; SA-17 (3)(c)Show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware; SA-17 (3)(d)Show that the formal top-level specification is an accurate description of the implemented security-relevant hardware, software, and firmware; and SA-17 (3)(e)Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant hardware, software, and firmware.
The organization requires the developer of the information system, system component, or information system service to: SA-17 (4)(a)Produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects; SA-17 (4)(b)Show via Selection: informal demonstration, convincing argument with formal methods as feasible that the descriptive top-level specification is consistent with the formal policy model; SA-17 (4)(c)Show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware; SA-17 (4)(d)Show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware, software, and firmware; and SA-17 (4)(e)Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant hardware, software, and firmware.
The organization requires the developer of the information system, system component, or information system service to: SA-17 (5)(a)Design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple protection mechanism with precisely defined semantics; and SA-17 (5)(b)Internally structure the security-relevant hardware, software, and firmware with specific regard for this mechanism.
The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate testing.
The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege. |