AIS-02: Are baseline requirements to secure different applications established, documented,
and maintained?
At a minimum, baseline requirements should include:
a. An alignment with established application security policies and industry standards. b. Risk assessment (business, technical risks) to evaluate application security alignment with the baseline and the performance of regular auditing (scanning/monitoring) to ensure such alignment is achieved. c. A consideration for unique requirements and characteristics of each application. d. Consideration and integration of lessons learned from issues/incidents back into the security policy. e. Incorporation of guidelines on how to meet and/or stay aligned with the established baseline. f. Periodic management review.
Control implemented
Control ownership
Description
Establish, document and maintain baseline requirements for securing
different applications.