Différences
Ci-dessous, les différences entre deux révisions de la page.
en:cs:quality_report [2018/02/11 21:48] – [Corporate requirements] fraggle | en:cs:quality_report [2021/12/27 18:25] (Version actuelle) – modification externe 127.0.0.1 | ||
---|---|---|---|
Ligne 69: | Ligne 69: | ||
===== Product Standards Compliance Process ===== | ===== Product Standards Compliance Process ===== | ||
- | The Product Standards (PS) Compliance process is a process in where every SAP product needs to plan, implement, test, and report its fulfillment of the product standard requirements. This process is a lean governance | + | The Product Standards (PS) Compliance process is a process in where every SAP product needs to plan, implement, test, and report its fulfillment of the product standard requirements. This process is a lean type governance |
==== Governance Model ==== | ==== Governance Model ==== | ||
Ligne 210: | Ligne 210: | ||
==== Role of the Product Standard Security requirements ==== | ==== Role of the Product Standard Security requirements ==== | ||
- | By introducing the risk-based secure Software Development Lifecycle the product standard security acts as product security knowledge base containing best practices of secure software development and as a threat-library for the program specific risk assessment. The question whether a program needs to comply with a product standard requirement or not depends on the underlying risk that was identified and rated during the risk assessment. | + | By introducing the risk-based secure Software Development Lifecycle the product standard security acts as product security knowledge base containing best practices of secure software development and as a threat-library for the program specific risk assessment. The question whether a program needs to comply with a product standard requirement or not depends on the underlying risk that was identified and rated during the risk assessment. |
In case of corporate violations in addition an exceptional approval needs to be requested. | In case of corporate violations in addition an exceptional approval needs to be requested. | ||
- | Links to the requirements | + | List of the requirements |
==== List of Product Standard Requirements ==== | ==== List of Product Standard Requirements ==== | ||
Ligne 275: | Ligne 275: | ||
| SEC-244 - Deliver with a secure default configuration | | |X| | | SEC-244 - Deliver with a secure default configuration | | |X| | ||
| SEC-275 - Enforce address space layout randomization, | | SEC-275 - Enforce address space layout randomization, | ||
- | | Secure-by-design | | | | | + | | **Secure-by-design** | | | | |
| SEC-219 - Provide a risk-adequate second line of defense against malicious input from the Internet | | |X| | | SEC-219 - Provide a risk-adequate second line of defense against malicious input from the Internet | | |X| | ||
| SEC-228 - Protect upload, download and display functions of untrusted files against MIME-type sniffing and virus attacks | | |X| | | SEC-228 - Protect upload, download and display functions of untrusted files against MIME-type sniffing and virus attacks | | |X| | ||
Ligne 292: | Ligne 292: | ||
Corporate Requirements and Corporate Product Standard Requirements explained in context of product security and data protection & privacy: | Corporate Requirements and Corporate Product Standard Requirements explained in context of product security and data protection & privacy: | ||
- | |||
=== 1. Corporate Requirements are part of the Global Development Policy === | === 1. Corporate Requirements are part of the Global Development Policy === | ||
Ligne 308: | Ligne 307: | ||
=== 2. Corporate Product Standard Requirements are part of the product standards === | === 2. Corporate Product Standard Requirements are part of the product standards === | ||
- | |||
A Corporate Requirement can also define certain product standard requirements as corporate. That means non-compliance of a corporate product standard requirement leads automatically to non-compliance to the referring Corporate Requirement of the Corporate Requirement Framework. | A Corporate Requirement can also define certain product standard requirements as corporate. That means non-compliance of a corporate product standard requirement leads automatically to non-compliance to the referring Corporate Requirement of the Corporate Requirement Framework. | ||
Ligne 314: | Ligne 312: | ||
For Data Protection & Privacy currently five corporate requirements are defined as part of the Product Standard Security: | For Data Protection & Privacy currently five corporate requirements are defined as part of the Product Standard Security: | ||
- | •SEC-254 - Log read access to sensitive personal data | + | * SEC-254 - Log read access to sensitive personal data |
+ | * SEC-255 - Provide a retrieval function which can be used to inform the data subjects about the personal data stored about them. | ||
+ | * SEC-256 - Erase personal data when all applicable retention periods have expired | ||
+ | * SEC-265 - Log changes to personal data | ||
+ | * SEC-224 - Capture explicit user consent before collecting any personal data. | ||
- | + | === 3. Deviations / Non-Compliance | |
- | •SEC-255 - Provide a retrieval function which can be used to inform the data subjects about the personal data stored about them. | + | |
- | + | ||
- | + | ||
- | •SEC-256 - Erase personal data when all applicable retention periods have expired | + | |
- | + | ||
- | + | ||
- | •SEC-265 - Log changes to personal data | + | |
- | + | ||
- | + | ||
- | •SEC-224 - Capture explicit user consent before collecting any personal data. | + | |
- | + | ||
- | + | ||
- | 3. Deviations / Non-Compliance | + | |
In case of deviations of one or more of these corporate product standard requirements an exceptional approval needs to be requested. | In case of deviations of one or more of these corporate product standard requirements an exceptional approval needs to be requested. | ||
- | For Product Security static corporate product standard requirements have been valid until May 2017. With the Global Security Policy | + | The Global Security Policy |
The Corporate requirement Develop and Operate Secure Software Products defines the following non-compliance: | The Corporate requirement Develop and Operate Secure Software Products defines the following non-compliance: | ||
- | •Known open vulnerabilities with CVSS base score >=7.0 are going to be delivered or re-delivered to customers in a new release or support package | + | * Known open vulnerabilities with CVSS (Common Vulnerability Scoring System) |
Besides of corporate product standard requirement deviations a corporate requirement non-compliance can also happen in case of a process violation. | Besides of corporate product standard requirement deviations a corporate requirement non-compliance can also happen in case of a process violation. | ||
- | For Security and DPP this means: | + | For Security and DPP (Data Protection & Privacy) |
- | •A Security Validation Report is rated by two stars or less can be considered as a process violation and exceptional approval needs to requested | + | |
- | + | ||
- | + | ||
- | + |