9. System acquisition, development and maintenance

9.1 Security requirements of information systems  

Objective: To ensure that information security is an integral part of information systems across the entire lifecycle. This also includes the requirements for information systems which provide services over public networks.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

9.2 Security in development and support processes  

Objective: To ensure that information security is designed and implemented within the development lifecycle of information systems.

9.1.1 Information security requirements analysis and specification

The information security related requirements should be included in the requirements for new information systems or enhancements to existing information systems.

  • Identify information security requirements using various methods such as deriving compliance requirements from policies and regulations, threat modelling and incident reviews. Information security requirements and controls should reflect the business value of the information involved and the potential negative business impact. 
  • Early consideration of information security requirements, e.g. at the design stage can lead to more effective and cost efficient solutions. 
  • Information security requirements include:
    a) the required protection needs of the assets regarding their availability, confidentiality, integrity;
    b) user authentication requirements;
    c) access provisioning and authorization processes, for end users as well as for privileged technical users;
    e) requirements derived from business processes, such as transaction logging and monitoring, non-repudiation requirements. 
  • Identify security requirements in contracts with the supplier. Where the security functionality of the product does not satisfy the specified requirement, reconsider the risk introduced and associated controls. Additional functionality should be reviewed to ensure it does not introduce unacceptable additional risks.

9.1.2 Securing application services on public networks

Information involved in application services passing over public networks should be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification.

  • Applications accessible via public networks are subject to a range of threats and fraudulent activities such as unauthorized message alteration, incomplete transmission, mis-routing or disclosure of information to the public. Therefore, conduct detailed risk assessments and select proper controls like controls that include cryptographic methods for authentication and securing data transfer. 
  • For application services passing over public networks:
    a) establish the level of confidence among the parties through authentication;
    b) establish authorization processes e.g. who may approve contents of, issue or sign key transactional documents;
    c) determine and meet requirements for confidentiality and integrity of key documents, for proof of dispatch and receipt of key documents;
    d) select the most appropriate settlement form of payment to guard against fraud to guarantee the confidentiality and integrity of any order transactions, payment information, confirmation of receipts etc. 
  • Application services can make use of secure authentication methods, e.g. using public key cryptography and digital signatures to reduce the risks. Also, trusted third parties can be used, where such services are needed.
  • Protect all aspects of the application service transactions by ensuring:
    a) the use of electronic signatures by each of the parties involved in the transaction;
    b) authentication information of all parties are valid and verified;
    c) the transaction remains confidential and privacy ofall parties involved is retained;
    d) communications path between all involved parties is encrypted;
    e) protocols used to communicate between parties are secured;
    f) the transaction details are stored outside of any publicly accessible environment and not retained and exposed on a storage medium directly accessible from the Internet;
  • Where a trusted authority is used (e.g. for the purposes of issuing and maintaining digital signatures or digital certificates) security is integrated and embedded throughout the entire end-to-end certificate/signature management process.