CSA CAN/CSA-ISO/IEC 27034-1:12
Information technology - Security techniques - Application security - Part 1: Overview and concepts
contributor author | CSA - CSA Group | |
date accessioned | 2017-09-04T18:43:43Z | |
date available | 2017-09-04T18:43:43Z | |
date copyright | 2012.10.01 | |
date issued | 2012 | |
identifier other | KCSPBFAAAAAAAAAA.pdf | |
identifier uri | http://yse.yabesh.ir/std;query=autho1826AF679D40527318548F1EFDEC014A0Facilities%20Engineering%20Command%22/handle/yse/225122 | |
description abstract | Purpose The purpose of ISO/IEC 27034 is to assist organizations in integrating security seamlessly throughout the life cycle of their applications by: a) providing concepts, principles, frameworks, components and processes; b) providing process-oriented mechanisms for establishing security requirements, assessing security risks, assigning a Targeted Level of Trust and selecting corresponding security controls and verification measures; c) providing guidelines for establishing acceptance criteria to organizations outsourcing the development or operation of applications, and for organizations purchasing from third-party applications; d) providing process-oriented mechanisms for determining, generating and collecting the evidence needed to demonstrate that their applications can be used securely under a defined environment; e) supporting the general concepts specified in ISO/IEC 27001 and assisting with the satisfactory implementation of information security based on a risk management approach; and f) providing a framework that helps to implement the security controls specified in ISO/IEC 27002 and other standards. ISO/IEC 27034: a) applies to the underlying software of an application and to contributing factors that impact its security, such as data, technology, application development life cycle processes, supporting processes and actors; and b) applies to all sizes and all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) exposed to risks associated with applications. ISO/IEC 27034 does not: a) provide guidelines for physical and network security; b) provide controls or measurements; or c) provide secure coding specifications for any programming language. ISO/IEC 27034 is not: a) a software application development standard; b) an application project management standard; or c) a software development life cycle standard. The requirements and processes specified in ISO/IEC 27034 are not intended to be implemented in isolation but rather integrated into an organization's existing processes. To this effect, organizations should map their existing processes and frameworks to those proposed by ISO/IEC 27034, thus reducing the impact of implementing ISO/IEC 27034. Annex A (informative) provides an example illustrating how an existing software development process can be mapped to some of the components and processes of ISO/IEC 27034. Generally speaking, an organization using any development life cycle should perform a mapping such as the one described in Annex A, and add whatever missing components or processes are needed for compliance with ISO/IEC 27034. | |
language | English | |
title | CSA CAN/CSA-ISO/IEC 27034-1:12 | num |
title | Information technology - Security techniques - Application security - Part 1: Overview and concepts | en |
type | standard | |
page | 92 | |
status | Active | |
tree | CSA - CSA Group:;2012 | |
contenttype | fulltext |