Open Riccardo-ten-Cate opened 5 years ago
- [ ] 8.4 Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. - [ ] 8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. - [ ] 13.1 Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications.
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development.
Expand knowledge base item
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum has been the industry's standard dummy text ever since the 1500s,
when an unknown printer took a galley of type and scrambled it to make a type specimen book. It
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services
- [ ] 8.4 Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. - [ ] 8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. - [ ] 13.1 Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications.
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development.
Expand knowledge base item
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum has been the industry's standard dummy text ever since the 1500s,
when an unknown printer took a galley of type and scrambled it to make a type specimen book. It
- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services
sad