800-53|SA-11

Title

DEVELOPER SECURITY TESTING AND EVALUATION

Description

The organization requires the developer of the information system, system component, or information system service to:

Supplemental

Developmental security testing/evaluation occurs at all post-design phases of the system development life cycle. Such testing/evaluation confirms that the required security controls are implemented correctly, operating as intended, enforcing the desired security policy, and meeting established security requirements. Security properties of information systems may be affected by the interconnection of system components or changes to those components. These interconnections or changes (e.g., upgrading or replacing applications and operating systems) may adversely affect previously implemented security controls. This control provides additional types of security testing/evaluation that developers can conduct to reduce or eliminate potential flaws. Testing custom software applications may require approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Developers can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Security assessment plans provide the specific activities that developers plan to carry out including the types of analyses, testing, evaluation, and reviews of software and firmware components, the degree of rigor to be applied, and the types of artifacts produced during those processes. The depth of security testing/evaluation refers to the rigor and level of detail associated with the assessment process (e.g., black box, gray box, or white box testing). The coverage of security testing/evaluation refers to the scope (i.e., number and type) of the artifacts included in the assessment process. Contracts specify the acceptance criteria for security assessment plans, flaw remediation processes, and the evidence that the plans/processes have been diligently applied. Methods for reviewing and protecting assessment plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.

Reference Item Details

Related: CA-2,CM-4,SA-3,SA-4,SA-5,SI-2

Category: SYSTEM AND SERVICES ACQUISITION

Family: SYSTEM AND SERVICES ACQUISITION

Priority: P1

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
4.6 Ensure that HEALTHCHECK instructions have been added to container imagesUnixCIS Docker v1.7.0 L1 Docker - Linux
MS.AAD.1.1v1 - Legacy authentication SHALL be blocked.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.2.1v1 - Users detected as high risk SHALL be blocked.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.2.2v1 - A notification SHOULD be sent to the administrator when high-risk users are detected.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.2.3v1 - Sign-ins detected as high risk SHALL be blocked.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.3.6v1 - Phishing-resistant MFA SHALL be required for highly privileged roles.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.3.7v1 - Managed devices SHOULD be required for authentication.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.3.8v1 - Managed Devices SHOULD be required to register MFA.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.AAD.8.3v1 - Guest invites SHOULD only be allowed to specific external domains that have been authorized by the agency for legitimate business purposes.microsoft_azureCISA SCuBA Microsoft 365 Entra ID v1.5.0
MS.EXO.16.1v1 - At a minimum, the following alerts SHALL be enabled:microsoft_azureCISA SCuBA Microsoft 365 Exchange Online v1.5.0
MS.POWERPLATFORM.3.1v1 - Power Platform tenant isolation SHALL be enabled.microsoft_azureCISA SCuBA Microsoft 365 Power Platform v1.5.0
MS.TEAMS.1.2v1 - Anonymous users SHALL NOT be enabled to start meetings.microsoft_azureCISA SCuBA Microsoft 365 Teams v1.5.0
MS.TEAMS.5.2v1 - Agencies SHOULD only allow installation of third-party apps approved by the agency.microsoft_azureCISA SCuBA Microsoft 365 Teams v1.5.0
MS.TEAMS.5.3v1 - Agencies SHOULD only allow installation of custom apps approved by the agency.microsoft_azureCISA SCuBA Microsoft 365 Teams v1.5.0