The following requirements relate to security testing activities for all applications developed within Example Inc. that are planned to be used (or already used) in production:
Correct and complete implementation of security & security-relevant requirements and changes MUST be verified with suitable security tests.
Where possible, security tests SHOULD be executed automatically and continuously (e.g. within CI and CD pipelines) and as early as possible within the development process (fail fast principle).
Test data MUST not contain confidential or personal (PII data) references.
The execution of security tests MUST NOT be affected by perimetric security systems (e.g. a web application firewall).
Security defects MUST be tracked in defect tracking system and provide relevant meta information (e.g. criticality rating, CVSS score etc.).
Open security defects SHOULD be regularly checked for relevance and possible quick wins.
For applications with assurance class >= [HIGH], security risks MUST also tracked in defect tracking system.
Utilize automated security testing tools:
Applications MUST be automatically analyzed with security code scanning tools (SAST or IAST) in order to identify implementation vulnerabilities in source and program code as early as possible.
Applications MUST be automatically analyzed with SCA (Software Composition Analysis) tools for any known vulnerabilities in 3rd party dependencies.
Docker images used in the target production environment MUST be automatically scanned for security issues.
Security-relevant configuration MUST be automatically scanned for security issues.
For applications with assurance class >= [HIGH] Security testing tools MUST automatically enforce security requirements and security testing policies within the build process as specified at https://secodis.atlassian.net/wiki/spaces/TSSWEB/pages/98338.
Applications with assurance class [VERY HIGH] SHOULD be periodically tested for denial-of-service attackability.
Custom security tests & developer tests:
Security tests of implemented security requirements and security controls (e.g. authentication or access controls) SHOULD be implemented, executed, preferably in an automatically and continuously way.
Developer and system acceptance testing SHOULD include testing for functional (security controls) and non-functional security requirements.
Abuse cases SHOULD be created & tested for critical business security aspects in applications with assurance class >= [HIGH].
Applications MUST be verified by penetration tests according to the pentesting policy bellow. Penetration tests SHOULD be carried out within environments that are close to production environments (e.g. on integration systems).
After an severe vulnerability has been fixed, a retest should be executed, ideally by the same tester, in order to verify the correct implementation of the fix.
Accessibility of Application
Internal Application (Non-Internet-Facing)
Before initial go live but at least annually
ASAP after initial go-live but at least every third year
Before initial go live but at least every second year
Table 6-1: Pentesting Policy
 E.g. using predefined tests for common injection vulnerabilities (XSS, SQLi), access controls (trying to access sensitive objects with no/insufficient privileges) and fuzz testing.
 In the case where it is ensured that no changes are made to an application, this interval MAY be extended by one additional year.