PR.PS-06.257

Does your organization implement controls to protect all components of internally developed software from tampering and unauthorized access throughout the software development lifecycle?

Explanation

This question assesses whether your organization has implemented safeguards to prevent unauthorized modifications to source code, build systems, deployment pipelines, and other software components. Effective controls might include code signing, access restrictions to repositories, secure build environments, integrity verification mechanisms, and change management processes. Evidence could include documentation of your secure software development lifecycle (SDLC) process, access control lists for code repositories, code signing certificates and procedures, integrity verification reports, and change management logs showing approval workflows for code modifications.

Implementation Example

Protect all components of organization-developed software from tampering and unauthorized access

ID: PR.PS-06.257

Context

Function
PR: PROTECT
Category
PR.PS: Platform Security
Sub-Category
Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron