The strategies should include:
a. Defined security and automation requirements based on an organization's application deployment needs and standards.
b. Defined roles and responsibilities between security, application teams, and other stakeholder groups.
c. Identification and integration with existing application deployment processes.
d. Customization of secure application deployment for deployment types such as operating systems, network connections, configuration, etc.
e. Logging and monitoring of secure application deployment so that data issues can be promptly addressed by the appropriate people (incident or forensics).
f. Metrics to effectively measure deployment success.
The capabilities should be based on the organization's SSDLC and should include, for instance:
g. Defined and approved list of deployment and automation technologies.
h. Enablement for team members (e.g., developers, administrators, etc.) to dynamically address security issues when needed.
The strategies and capabilities should be reviewed periodically by senior management.
Establish and implement strategies and capabilities for secure, standardized, and compliant application deployment. Automate where possible.
The strategies should include:
a. Defined security and automation requirements based on an organization's application deployment needs and standards.
b. Defined roles and responsibilities between security, application teams, and other stakeholder groups.
c. Identification and integration with existing application deployment processes.
d. Customization of secure application deployment for deployment types such as operating systems, network connections, configuration, etc.
e. Logging and monitoring of secure application deployment so that data issues can be promptly addressed by the appropriate people (incident or forensics).
f. Metrics to effectively measure deployment success.
The capabilities should be based on the organization's SSDLC and should include, for instance:
g. Defined and approved list of deployment and automation technologies.
h. Enablement for team members (e.g., developers, administrators, etc.) to dynamically address security issues when needed.
The strategies and capabilities should be reviewed periodically by senior management.
Establish and implement strategies and capabilities for secure, standardized, and compliant application deployment. Automate where possible.