SA-15 Development Process, Standards, and Tools

System and Services Acquisition

High

Description

a. Require the developer of the system, system component, or system service to follow a documented development process that: 1. Explicitly addresses security and privacy requirements; 2. Identifies the standards and tools used in the development process; 3. Documents the specific tool options and tool configurations used in the development process; and 4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and b. Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy the following security and privacy requirements: [Assignment: organization-defined security and privacy requirements].

Supplemental Guidance

Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes facilitates effective supply chain risk assessment and mitigation.

Changes from Rev 4

No significant changes from Rev 4.

Compliance Mappings

ISO 27001:2022

A.8.25A.8.28A.8.33

ISO 27002:2022

8.258.288.33

COBIT 2019

APO11BAI03

CIS Controls v8

CIS 16CIS 16.1

NIST CSF 2.0

PR.PS-06

PCI DSS v4.0.1

6.16.2

CSA CCM v4

AIS-02AIS-04

CSA AICM v1

AIS-02AIS-04AIS-11MDS-10

MAS TRM

56

BIO2

8.258.288.33

RBI CSF

Annex1.6ITGRCA.12

FISC Security Guidelines

FISC.O10FISC.T6

HKMA TM-E-1

TME1.3.1TME1.3.2

MLPS 2.0

8.1.9.4

DNB Good Practice

DNB.10.4

EU CRA

CRA.I.1CRA.I.2a

SAMA CSF

1.43.2

NCA ECC

1-62-14

UAE IA

T10

CBB TM

TM-7

Qatar NIA

SD

CBUAE

CR-6

CBE CSF

CTO-4

SA JS2

JS2-SA

BoG CISD

CISD-SDLC

BoM CTRM

3.11

IOSCO Cyber Resilience

PROT-6

BCBS 239

Principle 6

CPMI-IOSCO PFMI

CG.IDCG.TE

FFIEC IS

II.C.17

NYDFS 500

500.5500.8

ECB CROE

CROE.2.3.4CROE.2.6.1

EBA ICT Guidelines

3.4.63.6.2

SEBI CSCRF

PR.ASPR.IP

BOT Cyber Resilience

Ch2.5Ch6.2

IEEE 1686-2022

5.10

PCI PTS v6

FH

FIPS 140-3

FIPS 140-3 §7.11

Common Criteria

CC Part 3 — SAR

Solvency II

EIOPA-ICT-4.11

NAIC Insurance Data Security

4-config

PRA SS1/23

P3.1P3.3

HITRUST CSF v11

10.b10.d

FDA 21 CFR Part 11

§11.10(a)

FDA Cybersecurity Guidance

SPDF-1ST-1

ISO 27799

14.214.3

CCSS v9.0

1.02.7

Basel SCO60

SCO60.51SCO60.52