Skip to main content
Version: 4.0

2.4.17 Development Infrastructure

This Section covers the infrastructure requirement needed for a secure development and manufacturing site. The requirements include recommendations for physical security and processes for asset management, development and release for the products.

Req NoRequirementPrimary KeywordSecondary KeywordCompliance Class And Applicability
2.4.17.1A documented Software Development Lifecycle ( SDLC ): this should be in diagram or words and should cover the security aspects, threats and mitigationsBusinessProcessMandatory for Class 1 and above
2.4.17.2A documented final release process: There is a controlled release process with unique version tagging, release checklist and stakeholder signoffBusinessProcessMandatory for Class 1 and above
2.4.17.3An Asset management policy for security related equipment: There is a controlled record of development hardware equipment, how is the equipment tracked and maintained? e.g. development PCs/Laptops and secure hardware build servers, HSMs etcBusinessPolicyMandatory for Class 1 and above
2.4.17.4There is a defined Document Management classification process and management plan for material that contains security related information: Document Marking "Confidential", "Secret" etc and a definition of these classes, along with a management policy for the classes , and staff awarenessBusinessProcessMandatory for Class 1 and above
2.4.17.5There are Data Backup processes for critical and secret data: There is a process to backup critical code and secret assets. The secret assets should be segregated and backed up securely. The backups should follow backup policy and procedures and should be tested for resilience and recoverabilityBusinessProcessMandatory for Class 1 and above
2.4.17.6Access Control, both Physical and for code repositories, and build artifacts: There is physical security in the office (locked doors, access logs) to limit access to authorised people only. Corporate data networks shall be secured and managed (i.e. secure login, data access control and logs).BusinessProcessMandatory for Class 1 and above
2.4.17.7Secure Assets and Key Management: A Policy and process to manage and keep assets secure e.g. secure signing facility, access control logs, audit trail of access, policy when assets moved/copied from secure facilityBusinessPolicyMandatory for Class 1 and above
2.4.17.8Security Risk Assessment: All work must be covered by an up to date risk assessment (RA), including a process to create and maintain it. The RA is reviewed during the project, and at the release point to accept the severity of all risks based on product expectations and risk appetite.BusinessProcessMandatory for Class 1 and above
2.4.17.9Data destruction: There is a policy regarding the lifetime of secure and/or private data and a process for its destruction. This should align with relevant geographic regulations/policies.BusinessPolicyMandatory for Class 1 and above
2.4.17.10HR Security Policy: There is a policy and process to manage employees and any authorised visitors (i.e. ID checks, signed agreements on confidentiality, non disclosure, code of conduct, ethics etc) - this should cover both on-boarding and termination.BusinessPolicyMandatory for Class 1 and above