Chat with Experta

User
What will the certification auditor ask regarding secure software development?
Experta
During the certification audit, the auditor might look for the following evidence regarding secure software development:
- If security rules are integrated into the software lifecycle process, i.e., from the software conception to software retirement (control A.8.25 Secure development life cycle).
- If information security requirements are considered in acquired and/or developed software (control A.8.26 Application security requirements).
- If principles and methods for engineering secure systems are integrated into the software lifecycle process (control A.8.27 Secure system architecture and engineering principles).
- If principles for secure coding are integrated into the software lifecycle process (control A.8.28 Secure coding).
- If the software is tested against the security requirements to ensure security is implemented as specified (control A.8.29 Security testing in development and acceptance)
- If software development performed by external parties is considering proper practice and security rules (control A.8.30 Outsourced development).
- If development, test, and production environments are effectively separated (control A.8.31 Separation of development, test and production environments).
- If changes in information systems are properly controlled and authorized (control A.8.32 Change management).
- If the information used for testing information systems is properly selected and protected (control A.8.33 Test information).

Examples:
- A company has written a Secure Development Policy where it has defined the process that software needs to follow from conception to retirement — the auditor might ask to see documentation from several developed information systems to see if they are following the defined process.
- A company has written Security Requirements Specification documents where it defines what acquired or developed systems need to fulfill in terms of security — The auditor might ask to see several requirements documentation to see if related information systems comply with them.
- A company has defined in its Secure Development Policy principles and methods for engineering secure systems — the auditor might ask to see documentation from several developed information systems to see if defined principles and methods are being followed.
- A company has defined in its Secure Development Policy principles for secure coding — the auditor might ask to see coding documentation from several developed information systems to see if defined principles for secure coding are being followed.
- A company has defined in its Secure Development Policy a security testing process — the auditor might ask to see several testing reports to see if the defined testing process is being followed.
- A company has defined in its Secure Development Policy what needs to be considered for software developed by third parties — the auditor might ask to see contracts/service agreements established with outsourced developers, and documentation developed by them, to see if defined conditions are being followed.
- A company has defined in its Secure Development Policy how environments are separated, and criteria for evaluating separation needs — the auditor might ask to see the implemented configuration for separation of environments to see if they are compliant with defined rules.
- A company has written a Security Procedures for IT Department document where it defines how changes are controlled and authorized — the auditor might ask to see the latest assets that have been changed and their change reports to see how they were controlled and by whom they were approved.
- A company has defined in its Secure Development Policy rules to select data for testing of information systems and how to handle them — the auditor might ask to see various test data repositories to see if they are defined and handled according to defined rules.