|
|
G.1.1 Organizational security requirements
|
|
|
G.1.2 Software license conflict
|
|
|
G.1.3 Produce attestation
|
|
|
G.1.5 Deliver SBOM
|
|
|
G.2.1 Upper management support
|
|
|
G.2.2 Secure SDLC checks
|
|
|
G.2.3 Roles and responsibilities
|
|
|
G.2.4 Security code review policy
|
|
|
G.2.5 Asset inventory
|
|
|
G.2.6 Protection of information at rest
|
|
|
G.3.1 Security-related contract terms
|
|
|
G.3.2 Separation of duties
|
|
|
G.4.1 Role-based training
|
|
|
G.4.2 Contingency training
|
|
|
G.4.3 Gather attack trends
|
|
|
G.5.1 Criticality analysis
|
|
|
G.5.2 Track security risks and decisions
|
|
|
G.5.3 Security metrics
|
|
|
G.5.4 Data-informed product decisions
|
|
|
P.1.1 Product security requirements
|
|
|
P.1.2 Software release integrity
|
|
|
P.2.1 Security design review
|
|
|
P.2.2 Secure coding
|
|
|
P.2.6 Confirm Integrity of AI model data
|
|
|
P.3.1 Component and container choice
|
|
|
P.3.2 Trusted repositories
|
|
|
P.3.3 Require signed commits
|
|
|
P.3.4 Vetted third-party component and container repositories
|
|
|
P.4.1 Security code review
|
|
|
P.4.2 Automated security scanning tools
|
|
|
P.4.3 Automated vulnerability detection
|
|
|
P.4.5 Regular third-party compliance
|
|
|
P.5.1 SBOM consumption
|
|
|
P.5.2 Dependency update
|
|
|
E.1.2 Version control
|
|
|
E.1.5 Branch protection
|
|
|
E.2.1 Release policy verification
|
|
|
D.1.1 Vulnerability analysis
|
|
|
D.1.2 Risk-based vulnerability remediation
|
|
|
D.1.3 Vulnerability disclosure
|
|
|
D.1.4 Vulnerability eradication
|
|
|
D.1.6 Root cause analysis
|
|
|
P.3.5 Prevent component vetting bypass
|
|
|
D.1.5 Emergency artifact fix
|
|
|
G.3.x Support Upstream Dependencies
|
|
|
E.3.x Development Environment Scanning Tools
|
|
|
D.1.x Establish Response Partnerships
|