Open Riccardo-ten-Cate opened 5 years ago
- [x] 8.4 Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. - [ ] 8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. - [ ] 13.1 Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications.
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [x] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services
SKF integration test