Secure Development Lifecycle (4th Copy)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Secure Development Lifecycle

Contents
Secure Development Lifecycle 1
Secure Development Lifecycle Overview 1
Secure Development Lifecycle Tracks 1
Developer Security Training 2
Design/Architecture Review 2
Threat Modeling 9
Security User Stories/Security Requirements 10
Automated Dynamic Application Security Testing (DAST) 12
Automated Static Application Security Testing (SAST) 13
Open Source Software Vulnerability Assessment 13
Penetration Testing/Assessment 13

ii Secure Development Lifecycle


Secure Development Lifecycle

Secure Development Lifecycle Overview


Purpose
This framework establishes the GE Digital Platform & Product Cybersecurity (GED P&P Cybersecurity)
Secure Development Lifecycle (SDL) guidelines for GE's customers, partners, and developers. The
framework establishes a set of requirements and direction for product safety, quality and reliability, with
the goal of reducing security risk exposure for GE Digital/Predix platform and its ecosystem of products
and services.

Scope
This framework applies to all software products and services developed by GE customers, partners, and
developers. It also applies to related integration efforts involving commercial or open source software.
The customers, partners, and developers must have resources available to them in order to follow the SDL
prior to publishing an application or service for GE Digital.

Secure Development Lifecycle Tracks


The GED P&P Cybersecurity SDL follows traditional “SDL for Agile” frameworks, with a few notable
exceptions to gear it more towards development for the Industrial Internet. Not every task in the Agile
process is represented as an SDL track in this procedure, but every track corresponds to a set of activities
in the Agile process.

Figure 1: SDL Tracks

1
The following tracks are integral to the SDL implementation and each is explained in greater detail in
focused sections further in this online artifact.
• Developer Security Training – Ongoing courses provided to developers to improve their understanding
of techniques for identifying and mitigating security vulnerabilities. Training focuses on topics including
threat modeling, DAST testing, and coding techniques to prevent common defects such as SQL
injection.
• Design/Architecture Review – A collaborative effort between the partner or customer development or
engineering teams and their own product security group to assess and develop application or service
design patterns that mitigate risk to the platform and associated applications and services.
• Threat Modeling – A structured approach for analyzing the security of an application, with special
consideration for boundaries between logical system components which often communicate across
one or more networks.
• Security User Stories / Security Requirements – A description of functional and non-functional
attributes of a software product and its environment which must be in place to prevent security
vulnerabilities. Security user stories or requirements are written in the style of a functional user story
or requirement.
• Automated Dynamic Application Security Testing (DAST) - A process of testing an application or
software product in an operating state, implemented by a web application security scanner.
• Automated Static Application Security Testing (SAST) – A process of testing an application or software
product in a non-operating state, analyzing the source code for common security vulnerabilities.
• Penetration Testing – Hands-on security testing of a runtime system. This sort of testing uncovers
more complex security flaws that may not be caught by DAST or SAST tools.
Note: Traditional SDL for Agile does not require automated DAST or SAST, but the general industry trend
is towards automation, both to promote consistent usage and to improve efficiency. This is critical for
developing on GE Digital or Predix's Industrial Internet applications and services.

Developer Security Training


Developer security training is foundational to all the security tracks highlighted in this procedure. Without
this training, together with experience and a security mindset, it will not be possible to do threat
modeling, write accurate security user stories, or evaluate SAST or DAST results.
There are a number of paid and free resources available to customers, partners, and developers.
Enterprises typically have their own SDL curriculums or training courses. Others can subscribe to online
services while everyone can benefit from free training provided by such organizations as SAFECode:
https://training.safecode.org/

Related Concepts
Automated Dynamic Application Security Testing (DAST) on page 12
Automated Static Application Security Testing (SAST) on page 13

Design/Architecture Review
An application or service developed by a customer, partner, or developer must produce an architecture
and design that has taken into account security considerations to help improve the overall GE Digital
platform and products security posture so that everyone can benefit from it. The cost and effort of
retrofitting security after development is too high. An architecture and design review helps development
and engineering teams validate the security-related design features of their application or service before
starting the development phase. This allows the partner/customer to identify and fix potential
vulnerabilities before they can be exploited and before the fix requires a substantial re-engineering effort.

2
The architecture and design review process analyzes the architecture and design from a cybersecurity
perspective. Ideally, the design will commence with assistance from the partner/customer product
security teams or other experts at the concept phase. If design artifacts already exist, it should facilitate
this process nonetheless. Despite the comprehensive nature of the design documentation, the
development and engineering teams must be able to decompose the application and be able to identify
key items, including trust boundaries, data flow, entry points, and privileged code. The physical
deployment configuration of the application must also be known. Special attention must be given to the
design approaches adapted for those areas that most commonly exhibit vulnerabilities. The guidance
provided here will help the partner/customer develop and secure their products and services.
For further information on this subject, refer to tables below:
• General Design Principles for Secure Software Development
• Securing Web Applications
• Secure Session Management
• Transport Layer Protection
• Securing Passwords
• Mobile Application Security

General Design Principles for Secure Software Development

General Principles Key Practices Benefits Examples and Practices

Minimize the Principle of least privilege Minimizes the number of actors in In a traditional web portal
number of high- the system that are granted high application, the end user is only
consequence levels of privilege and the amount of allowed to read, post content, and
targets time any actor can hold onto its enter data into HTML forms, while
privileges. the webmaster has all the
permissions.

Separation of privileges, Ensures that no single entity (human Developers should have access to
duties, and roles or software) should have all the the development and test code/
privileges required to modify, delete, systems; however, they should not
or destroy the system, components, have access to the production
and resources. system. If developers have access to
the production system, they could
make unauthorized edits that could
lead to a broken application or add
malicious code for their personal
gain. The code needs to go through
the appropriate approvals and
testing before production
deployment. On the other hand,
administrators should be able to
deploy the package into production,
but should not have the ability to edit
the code.

Separation of domains Makes separation of roles and Database administrators should not
privileges easier to implement. have control over business logic and
the application administrator should
not have control over the database.

3
General Principles Key Practices Benefits Examples and Practices

Do not expose Keep program data, Reduces the likelihood that an On Unix or Linux systems, the chroot
vulnerable or high- executables, and attacker who gains access to jail feature of the standard operating
consequence configuration data program data will easily locate and system access controls can be
components separated gain access to program executables configured to create an isolated
or control/configuration data. execution area for software, thus
serving the same purpose as a Java
or Perl sandbox.

Segregate trusted entities Reduces the exposure of the Java and Perl’s sandboxing and .NET’s
from untrusted entities software’s high-consequence Code Access Security mechanism in
functions from its high-risk its Common Language Runtime (CLR)
functions, which can be susceptible assigns a level privilege to
to attacks. executables contained within it. This
privilege level should be the minimal
needed by the functions to perform
its normal expected operation. If any
anomalies occur, the sandbox/CLR
generates an exception and an
exception handler prevents the
executable from performing the
unexpected operation.

Minimize the number of Reduces the attack surface. Firewalls provide a single point of
entry and exit points contact (chokepoint) that allows the
administrator control of traffic
coming into or out of the network.
Like a firewall, strive for one entry
point into any software entity
(function, process, module
component) and ideally one exit
point.

Assume environment data is Reduces the exposure of the Java Platform, Enterprise Edition
not trustworthy software to potentially malicious (Java EE) components run within
execution environment components contexts (for example, System
or attacker-intercepted and modified Context, Login Context, Session
environment data. Context, Naming and Directory
Context, etc.) that can be relied on to
provide trustworthy environment
data at runtime to Java programs.

Use only trusted interfaces This practice reduces the exposure Application-level programs should
to environment resources of the data passed between the call only other application-layer
software and its environment. programs, middleware, or explicit
APIs to system resources.
Applications should not use APIs
intended for human users rather
than software nor rely on a system-
level tool (versus an application-level
tool) to filter/modify the output.

4
General Principles Key Practices Benefits Examples and Practices

Deny attackers the Simplify the design This practice minimizes the number The software should limit the
means to of attacker-exploitable number of states, favor deterministic
compromise vulnerabilities and weaknesses in processes over non-deterministic
the system. processes, use single-tasking rather
than multitasking whenever
practical, use polling rather than
interrupts, etc.

Hold all actors accountable This practice ensures that all Enforce accountability with the
attacker actions are observed and combination of auditing and non-
recorded, contributing to the ability repudiation measures. Audit
to recognize and isolate/block the amounts to security-focused event
source of attack patterns. logging to record all security-relevant
actions performed by the actor while
interacting with the system. Audits
are after-the-fact and often can be
labor intensive; Security-Enhanced
Linux (SELinux) can be used to
enforce data access using security
labels. Non-repudiation measures,
most often a digital signature, bind
proof of the identity of the actor
responsible for modifying the data.

Timing, synchronization, and Modeling and documenting timing, Whenever possible, make all
sequencing should be synchronization, and sequencing individual transactions atomic, use
simplified to avoid issues. issues reduce the likelihood of race multiphase commits for data writes,
conditions, order dependencies, use hierarchical locking to prevent
synchronization problems, and simultaneous execution of processes,
deadlocks. and reduce time pressures on system
processing.

Make secure states easy to Reduces the likelihood that the Software should always begin and
enter and vulnerable states software will be allowed to end its execution in a secure state.
difficult to enter inadvertently enter a vulnerable
state.

Design for controllability Makes it easier to detect attack To increase the software
paths, and disengage the software controllability, design the software to
from its interactions with attackers. have the ability to self-monitor and
Take caution when using this limit resource usage, provide
approach since it can open up a exception handling, error handling,
whole range of new attack vectors. anomaly handling, and provide
feedback that enables all
assumptions and models to be
validated before decisions are taken.

Design for secure failure Reduces the likelihood that a failure Implement watchdog timers to check
in the software will leave it for the “I’m alive” signals from
vulnerable to attack. processes and use exception
handling logic to correct actions
before a failure can occur.

5
Securing Web Applications—OWASP's Code Review Guide Recommendations

General Principles Recommendations

Authentication • Ensure all internal and external connections (user and entity) go through an appropriate
and adequate form of authentication.
• Ensure all pages enforce the requirements for authentication.
• Pass authentication credentials or sensitive information only using the HTTP POST
method; do not accept HTTP GET method.
• Ensure authentication credentials do not traverse the wire in clear text form.

Authorization • Ensure the application has clearly defined the user types and the rights of said users.
• Grant only those authorities necessary to perform a given role.
• Ensure the authorization mechanisms work properly, fail securely, and cannot be
circumvented.
• Do not expose privileged accounts and operations externally.

Cookie Management • Ensure that unauthorized activities cannot take place using cookie manipulation.
• Encrypt the entire cookie if it contains sensitive data.
• Ensure secure flag is set to prevent accidental transmission over the wire in a non-
secure manner. The secure flag dictates that the cookie should only be sent over secure
means, such as Secure Sockets Layer.
• Do not store private information on cookies. If required, only store what is necessary.

Data/Input Validation Examine and validate all external inputs.

Error Handling / Information • Ensure the application fails in a secure manner.


Leakage • Ensure resources are released if an error occurs.
• Do not expose system errors to the user.

Logging/Auditing • Ensure the payload being logged is of a defined maximum length and the logging
mechanism enforces that length.
• Log both successful and unsuccessful authentication attempts.
• Log access to sensitive data files.
• Log privilege escalations made in the application.
• Do not log sensitive information.

Cryptography • Ensure the application is implementing reliable cryptographic methods.


• Do not transmit sensitive data in the clear, internally, or externally.
• Do not develop custom cryptography.

6
Session Management

Session Management Issues Recommendations

Attacker guessing the user’s session ID Session IDs should be created with the same standards as passwords. This
means that the session ID should be of considerable length and complexity.
There should not be any noticeable pattern in the session IDs that could be
used to predict the next ID to be issued.

Attacker stealing the user’s session ID Session IDs, like all sensitive data, should be transmitted by secure means
(such as HTTPS) and stored in a secure location (not publically readable).

Attacker setting a user’s session ID (session The application should check that all session IDs in use were originally
fixation) distributed by the application server.

Transport Layer Protection

Transport Layer Protection Recommendations

TLS • Require TLS for all sensitive pages. Non-TLS requests to these pages
should be redirected to the TLS page.
• Configure your TLS provider to only support strong algorithms, for
example FIPS 140-2 compliant.
• Backend and other connections should also use TLS or other encryption
technologies.

Cookies Set the secure flag on all sensitive cookies to prevent the browser from
sending any cookie with the secure flag enabled to any HTTP connections.

Certificates Ensure your certificate is valid, not expired, not revoked, and matches all
domains used by the site.

Securing Passwords

Password Security Recommendations

Password Complexity Enforce password complexity requirements established by policies or


regulations. Authentication credentials should be sufficient to withstand
attacks that are typical of the threats in the deployed environment. An
example of password complexity is requiring alphabetic as well as numeric
and/or special characters in the password.

Password Minimum Length Enforce a minimum length requirement for passwords, as established by
policies or regulations. OWASP recommends at least eight characters, but
16 characters or the use of multi-word pass phrases provides a better
solution.

Password Change Enforce password changes based on requirements established in policies or


regulations. Critical systems may require more frequent password changes.

Password Reuse Prevent password reuse. Passwords should be at least one day old before
they can be changed.

Failed Login Disable the account after a certain number of failed login attempts.

7
Password Security Recommendations

Error Messages Display generic error messages when a user types in an incorrect user name
or password.

Password Storage Store passwords in the database as salted hash values.

Mobile Application Security

Password Security Recommendations

Insecure Data Storage Store only what is absolutely required. Never use public storage areas, for
example SD cards. Leverage secure containers and platform-provided file
encryption APIs and do not grant files world readable or world writeable
permissions.

Weak Server-Side Controls Understand the additional risks mobile applications can introduce into
existing architectures. Use the wealth of knowledge already available, for
example, OWASP Web Top 10, Cloud Top 10, cheat sheets, and development
guides.

Insufficient Transport Layer Protection Ensure all sensitive data leaving the device is encrypted. This includes data
over carrier networks, Wi-Fi, and so on.

Client-Side Injection Sanitize or escape untrusted data before rendering or executing it. Use
prepared statements for database calls (concatenation is a bad practice)
and minimize the sensitive native capabilities tied to hybrid web
functionality.

Poor Authorization and Authentication Contextual information can enhance the authentication process, but only as
a part of a multifactor authentication. Never use a device ID or subscriber ID
as a sole authenticator. Authenticate all API calls to paid resources.

Improper Session Handling Do not use a device identifier as a session token. Make users reauthenticate
every so often and ensure that tokens can be revoked quickly in the event of
a stolen/lost device.

Security Decisions Using Distrusted Inputs Check caller’s permissions at input boundaries. Prompt the user for
additional authorization before allowing consummation of paid resources.
When permission checks cannot be performed, ensure additional steps are
required to launch sensitive actions.

Side Channel Data Leakage Understand what third-party libraries in your application are doing with the
user data. Never log credentials, PII, or other sensitive data to system logs.
Remove sensitive data before screenshots are taken. Before releasing apps,
debug them to observe files created, written to, or modified in any way. Test
your application across as many platform versions as possible.

Broken Cryptography Encoding, obfuscation, and serialization is not considered encryption.

Prevention tips: Do not store the key with the encrypted data; use what your
platform already provides. Do not develop in-house cryptography.

Sensitive Information Disclosure Do not store the private API keys in the client. Keep proprietary and
sensitive business logic on the server. Never hard code the password.

8
Threat Modeling
Threat modeling is a structured approach for analyzing the security of a product. Threat modeling
evaluates the various attack surfaces of the product and identifies the vulnerabilities in design, thereby
helping the software architect to mitigate the effects of the threat to the system.

Why should we do threat modeling?


Threat modeling identifies vulnerabilities in the design phase of software development, making concerns
easier and cost-effective to resolve. Also, threat modeling ensures that products are developed with built-
in security from the beginning.
Development teams are responsible for the security of applications they create and maintain. Each team,
in consultation with GED P&P Cybersecurity, keeps a threat model of its application, operating
environment, and data flow boundaries.
The Threat Model should be reviewed and updated by the partner or customer engineering teams and
their product security teams at least once prior to each release.
To provide visibility and the ability to audit, threat models should be posted in a central repository
location, with role-based access control.
The benefits of continuous threat modeling include:
• Identify security gaps early on and tackle these in the design phase when they are most economical
and quickest to address.
• Reduce the number of serious, complex defects uncovered during security testing.
• Provide visibility across a project, clarifying the need for planning and development efforts that
address security.
• Provide for a visual representation of system security components, data flows and boundaries.
• Maintain an up-to-date risk profile.
• Raise awareness across development teams so that security becomes a daily priority, alongside
functional development and deployment tasks.

How should threat modeling be implemented?


The threat modeling process can be classified in three steps:
1. Decompose the system
The threat modeling process begins with understanding the system and the way it interacts with
external entities. Decomposing the system involves:
• Creating use cases to understand how the application is used.
• Identifying entry points to see where a potential attacker could interact with the application.
• Identifying assets, for example items/areas of which the attacker would be interested.
• Identifying trust levels which represent the access rights that the application will grant to external
entities.
The partner or customer engineering team can document the above information in the Threat Model,
besides using it to produce data flow diagrams for the application. The diagrams show the different
paths through the system, highlighting the access privilege boundaries.

9
2. Determine and rank threats
Threats are identified using a threat categorization methodology. A threat categorization such as
STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of
Privilege) can be used to define threat categories such as:
• Auditing and Logging
• Authentication
• Authorization
• Configuration Management
• Data Protection in Storage and Transit
• Data Validation
• Exception Management
3. Determine countermeasures and mitigation
A lack of protection against a threat might indicate a vulnerability whose risk exposure could be
mitigated by implementing a countermeasure. Such countermeasures can be identified using threat-
countermeasure mapping lists. Once threats are assigned a risk-rank, sorting them from the highest
to lowest risk is possible. Risk-ranking also simplifies prioritizing the mitigation effort and threat
response by applying the identified countermeasures.

Are there any tools available for threat modeling?


GED P&P Cybersecurity recommends using the Microsoft Threat Modeling Tool 2016, which is available as
a free download:
https://www.microsoft.com/en-us/download/details.aspx?id=49168
Installing this tool requires a Windows machine/Windows virtual machine.

When should I develop threat models?


When you develop a new application or service for GE Digital, create a threat model during the design
phase. When you develop a new feature on an existing application or service, update the existing threat
model to incorporate/eliminate attack surfaces based on the new feature. Threat modeling is a living
design artifact for a product. It evolves with the development of a product.

Where do I store the developed threat model?


GED P&P Cybersecurity recommends that you store the Threat Model artifact in a safe and secure
location for your consumption and from where it can be made available for GED P&P Cybersecurity team
members to access and review. The GED P&P Cybersecurity will review the artifact to determine whether
it meets GED P&P Cybersecurity's criteria. Every threat model version should be committed with an
appropriate commit-message to identify the reason for the revision and the release in which the revised
design will be implemented.

Security User Stories/Security Requirements


Each application or service must go through some requirements gathering to facilitate review of
functional security stories and creation of the corresponding security user stories. For instance, if a
product calls for an authentication component, then the security user stories for this component would
focus on aspects such as account lockout, number of allowed failed login attempts, and password
complexity. (This is not a comprehensive list.)

10
Entities external of GE shall review security user stories within their development team and/or with their
SDL partner, make corrections as appropriate, and then enter these stories into the appropriate issue
tracking tool. Security stories are updated as functional requirements are added, changed, or removed.
Note that that there are two broad categories of security user stories:
1. Evil user story – Focused on how the hacker will exploit a vulnerability to compromise the security of a
system. This sort of story is told from the hacker’s point of view.
2. Nonfunctional security user story – Augments the functional definition of a product. This sort of story
provides security guidance.
The following sample set of security user stories was provided to an actual project team and was useful in
securing their product prior to public rollout. Some stories have been removed and others have been
modified so as not to reference the original project directly.
This set includes both nonfunctional security user stories and so-called evil user stories.

11
Scenario Evil Story Consequence Notes

1 Sample Project instances As an interested outside 1. Valid SHA-2 checksum


available for public party downloading a associated with the given Calculating Checksum
download present a Sample Project .ova file ova available for Example:
SHA-2 checksum. from Company XYZ, I can download is presented on
validate the SHA-2 hash the public download page. $ sha256sum Sample
associated with that .ova Project3.3.5.ova
2. MD5 and SHA-1 47585bd6222948ee6b138
file to check authenticity.
checksums are not
presented because these 166ec2812092d46a6abbc97
hash algorithms are no 6028799a57egare002d4c
longer collision-resistant.

2 Sample Project default As an unauthorized user / 1. All Sample Project Refer to:
password complies with hacker, I know that the accounts are deployed
Company_XYZ_
Company XYZ password default Sample Project with default passwords
composition rules. Predix user password is that comply with the AccessManagement_Policy
"predix," enabling me to Company XYZ password
access an unattended composition rules.
customer Sample Project
instance that has been
customized by its owner
and where sensitive
information has been
stored.

3 Account credentials are As a hacker, I download 1. Review of new Sample


not cached in Firefox or the public version of Project image verifies that
elsewhere. Sample Project and open "Remember passwords for
Gmail in Firefox. I notice sites" is unchecked in
that the credentials to Firefox and that no
companyxyz, mail to: account credentials have
[email protected] been cached.
m are cached in Firefox. I
2. phpPgAdmin
log in and access a
credentials are no longer
security token posted by
cached in Firefox, which
another Sample Project
led to a hyperion database
user. I send malicious
containing traffic camera
email to other Sample
information, probably
Project users, resulting in
unrelated to Sample
information and account
Project.
compromise.

Automated Dynamic Application Security Testing (DAST)


Partners, customers and developers working with their product security teams or GED P&P Cybersecurity
SDL partner, should configure DAST scan profiles in their CI/CD build tool (ex. Jenkins) and in the
application security scanner referenced by their build tool. This will help automate the scanning process
and streamline DevOps, should the third party be using a DevOps approach to development.
However, if you use a standalone SaaS-based DAST scanning tool, the tool must meet GED P&P
Cybersecurity requirements. The following SaaS-based DAST tools meet GED P&P Cybersecurity
requirements:

12
Tinfoil Security:https://www.tinfoilsecurity.com/
Burpsuite: https://portswigger.net/

Automated Static Application Security Testing (SAST)


Partners, customers and developers working with their product security teams should configure SAST
scan profiles in their CI/CD build tool, for example Jenkins, and in the SAST scanner that their built tool
references. This will help automate the scanning process and streamline DevOps, should the partner or
customer be using a DevOps approach to development.
However, if you use a standalone SAST scanning tool, the scanning tool must meet GED P&P
Cybersecurity requirements. Products that can facilitate the SAST efforts are as follows, but note that
GED P&P Cybersecurity does not endorse any of the technologies.
https://www.checkmarx.com/technology/static-code-analysis-sca/
http://www8.hp.com/us/en/software-solutions/static-code-analysis-sast/
http://www.veracode.com/products/binary-static-analysis-sast/
https://scan.coverity.com/
https://www.sonarqube.org/downloads/

Open Source Software Vulnerability Assessment


Fixing software vulnerabilities is a crucial defense against exploitation and potential breach. With open
source software (OSS), the vulnerability is further magnified. Hence, the need for OSS assessment is
impertive and the use of OSS security assessment tools is critical.
The OSS security assessment process involves tools that:
• Identify open source throughout the product code base.
• Map known vulnerabilities to the open source in use by the product.
• Recommend remediation for identified outstanding vulnerabilities in open source components.
Some SAST products also provide OSS scanning capabilities. Products that can facilitate OSS efforts are as
follows, but note that GED P&P Cybersecurity does not endorse any of these technologies.
http://www.whitesourcesoftware.com/
https://www.checkmarx.com/technology/static-code-analysis-sca/
http://www.veracode.com/products/binary-static-analysis-sast/
https://www.blackducksoftware.com/solutions/application-security

Penetration Testing/Assessment
Even when you have followed all the above steps, there may still be a possibility of a defect or
vulnerability making it to the final gate prior to going into production. To that end, pen testing provides a
final validation that secure code is going into production. GED P&P Cybersecurity recommends that all
customers, partners, and developers undergo this level of testing prior to final release to production. At
the discretion of GED P&P Cybersecurity, it may require a final pen test be conducted by the GED P&P
Cybersecurity Red Team.

13
The pen test assessment method is defined by the main attack vectors and test scenarios to be carried
out based on the information provided by the requestors. The goal of the pen test is not to have
comprehensive coverage of code scanning or finding all security defects that the technology has, but
rather focus on areas where there may be higher business risks. For example, the scenarios may target to
identify security defects that may expose critical data, compromise credentials, or have potential
reputational impact on the business. A pen tester will use various scanning tools, as well as manual
testing, to identify security vulnerabilities that have a high business impact. The length of each pen test
varies based on the scope size of the technology and the resources assigned.

14

You might also like