Correct and complete implementation of security & security-relevant requirements and changes MUST be verified with suitable security tests.
Where possible, security tests SHOULD be executed automatically and continuously (e.g. within CI and CD pipelines) and as early as possible within the development process (fail fast principle).
Test data MUST not contain confidential or personal (PII data) references.
The execution of security tests MUST NOT be affected by perimetric security systems (e.g. a web application firewall).
Security defects MUST be tracked in defect tracking system and provide relevant meta information (e.g. criticality rating, CVSS score etc.).
Open security defects SHOULD be regularly checked for relevance and possible quick wins.
For applications with assurance class >= [HIGH], security risks MUST also tracked in defect tracking system.
Utilize automated security testing tools:
Applications MUST be automatically analyzed with security code scanning tools (SAST or IAST) in order to identify implementation vulnerabilities in source and program code as early as possible.
Applications MUST be automatically analyzed with SCA (Software Composition Analysis) tools for any known vulnerabilities in 3rd party dependencies.
Docker images used in the target production environment MUST be automatically scanned for security issues.
Security-relevant configuration MUST be automatically scanned for security issues.
For applications with assurance class >= [HIGH] Security testing tools MUST automatically enforce security requirements and security testing policies within the build process as specified at 5. Security within Software Development Process.
Applications with assurance class [VERY HIGH] SHOULD be periodically tested for denial-of-service attackability.
Custom security tests & developer tests:
Security tests of implemented security requirements and security controls (e.g. authentication or access controls) SHOULD be implemented, executed, preferably in an automatically and continuously way.
Developer and system acceptance testing SHOULD include testing for functional (security controls) and non-functional security requirements.
Abuse cases SHOULD be created & tested for critical business security aspects in applications with assurance class >= [HIGH].
Applications MUST be verified by penetration tests according to the pentesting policy bellow. Penetration tests SHOULD be carried out within environments that are close to production environments (e.g. on integration systems).
After an severe vulnerability has been fixed, a retest should be executed, ideally by the same tester, in order to verify the correct implementation of the fix.