Mechanisms exist to ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP).
Mechanisms exist to ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP).
Mechanisms exist to require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use.
Mechanisms exist to limit the use of commercially-provided Information Assurance (IA) and IA-enabled IT products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile or the cryptographic module is FIPS-validated or NSA-approved.
Mechanisms exist to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software.
Mechanisms exist to ensure vendors / manufacturers: â–ª Deliver the system, component, or service with a pre-established, secure configuration implemented; and â–ª Use the pre-established, secure configuration as the default for any subsequent system, component, or service reinstallation or upgrade.
Mechanisms exist to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions.
Mechanisms exist to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions.
Mechanisms exist to include appropriate cybersecurity & data privacy representatives in the product feature and/or functionality change control review process.
Mechanisms exist to utilize only Commercial Off-the-Shelf (COTS) security products.
Mechanisms exist to obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk.