Controls
Secure Development
STATUS
CONTROL
Application Security Standards
Security standards based on OWASP Top 10 are defined for all applications. Authentication, authorization, input validation, and secure coding practices are required.
Bug Bounty Program
The organization maintains a bug bounty program to incentivize external security researchers to responsibly disclose vulnerabilities.
Penetration Testing
Applications and infrastructure are tested by qualified security experts at least annually and before major releases.
Source Code Management
Source code is stored in centralized repositories with branch protection, mandatory code reviews, and CI/CD pipelines for safe deployment to production.
Application Security Testing
Applications undergo automated security testing including static analysis (SAST), dynamic analysis (DAST), and open-source dependency scanning before production deployment.
Threat Modeling
Threat modeling is performed during the design phase of new features and products, including data flow analysis and risk identification.