SA-15 - Development Process, Standards, and Tools
Control requirements
The organization:
- SA-15 (a)
- Requires the developer of the information system, system component, or information system service to follow a documented development process that:
- Explicitly addresses security requirements;
- Identifies the standards and tools used in the development process;
- Documents the specific tool options and tool configurations used in the development process; and
- Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
- SA-15 (b)
- Reviews the development process, standards, tools, and tool options/configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy [Assignment: organization-defined security requirements].
Additional IBM Cloud for Financial Services specifications
- Documentation for the organization's application should contain self-documenting (or self-describing) source code and user interfaces and follow naming conventions and structured programming conventions that enable use of the system without prior specific knowledge. The purpose of this self-explanatory design principle is to make source code easier to read, understand, and maintain, and reduce the need for users/developers to consult external documentation sources such as code comments and software manuals.
Implementation guidance
See the resources that follow to learn more about how to implement this control.
IBM Cloud for Financial Services profile
The rules related to this control that follow are part of the IBM Cloud for Financial Services v1.2.0 profile in IBM Cloud® Security and Compliance Center.
Requirement ID | Rules |
---|---|
SA-15 (a) |
|
NIST supplemental guidance
Development tools include, for example, programming languages and computer-aided design (CAD) systems. Reviews of development processes can include, for example, the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes enables accurate supply chain risk assessment and mitigation, and requires robust configuration control throughout the life cycle (including design, development, transport, delivery, integration, and maintenance) to track authorized changes and prevent unauthorized changes.