Marked 1 year 1 month ago onto Guidelines for Secure Application Design, Development, Implementation, and Operations
One of the key reasons for vulnerabilities in the applications are lack of secure design,
development, implementation, and operations. Insecure application development is a primary cause of cyberinfrastructure vulnerabilities. Relying solely on post-development audits for security is insufficient. Security should be an integral part of the application's design and development process, with built-in measures to guard against security breaches and exploitation.
Once secure application design and development guidelines are implemented, the application can undergo source-code reviews and black-box testing by a CERT-In empaneled auditing organization to detect any shortcomings or vulnerabilities in security practices.
Read More: https://cyraacs.com/guidelin...
Comments
Leave your comment below