Are third party tools used during the software development process also evaluated for security issues?
Are third party tools used during the software development process also evaluated for security issues? If yes, so please describe
Is software written with the philosophy of “Security by Design”?
Is customer business data stored in a lower security environment than the software development environment?
Is there a mature version management process?
Do authentication and permissions methods support the sensitivity of the data that will be in the system in the future?
Is the customer data environment separated physically or logically from other customers data environments?
Is developer access to the developer environment supervised and monitored?
Are third party tools used during the software development process also evaluated for security issues?
Do standard QA checks involve cyber security/information security checks as well?
- 1
- 2