Cybersecurity & Data Protection Testing Throughout Development
Mechanisms exist to require system developers/integrators consult with cybersecurity and data protection personnel to: (1) Create and implement a Security Testing and Evaluation (ST&E) plan, or similar capability; (2) Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and (3) Document the results of the security testing/evaluation and flaw remediation processes.
Does the organization require system developers/integrators consult with cybersecurity and data protection personnel to: (1) Create and implement a Security Testing and Evaluation (ST&E) plan, or similar capability; (2) Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and (3) Document the results of the security testing/evaluation and flaw remediation processes?
Technology Development & Acquisition
Annual
E-TDA-03 E-TDA-05
This control maps to the following compliance frameworks
5.7.15.7.25.7.35.7.45.7.55.7.66.1.16.1.26.1.36.1.46.1.66.1.7
4.14.24.36.16.2
