6.5 Security
govstack-cfr security related requirements
govstack-cfr-security
#1 Transport security is enforced (REQUIRED IMMUTABLE OBSERVABLE) (previously 5.12)
#2 Only up-to-date and industry-accepted cryptographic algorithms are used for data protection (RECOMMENDED IMMUTABLE AUDITABLE)
#3 Access control and authentication is enforced (REQUIRED EXTENSIBLE OBSERVABLE)
#4 Secure configuration is used (REQUIRED IMMUTABLE AUDITABLE) (previously 5.21)
#5 No sensitive data such as keys, certificates or passwords is stored in code repositories or documentation (REQUIRED IMMUTABLE AUDITABLE)
#6 Input and output sanitization is used (RECOMMENDED EXTENSIBLE AUDITABLE) (previously 5.25)
#7 Logging and monitoring of security events is implemented (REQUIRED EXTENSIBLE AUDITABLE)
#8 Isolation and containment is ensured (RECOMMENDED EXTENSIBLE AUDITABLE)
#9 Secure API gateways are implemented (RECOMMENDED EXTENSIBLE OBSERVABLE)
#10 Clearly-defined key rotation policies are included (RECOMMENDED EXTENSIBLE AUDITABLE) (previously 5.16)
#11 Continuous vulnerability scanning and patching is implemented (RECOMMENDED EXTENSIBLE AUDITABLE)
#12 Disaster recovery and incident response plans are implemented (RECOMMENDED EXTENSIBLE AUDITABLE)
#13 Compliance and audit readiness is documented (RECOMMENDED IMMUTABLE AUDITABLE)
#14 Data at rest is encrypted (RECOMMENDED EXTENSIBLE AUDITABLE)
#15 A Software Bill of Materials is maintained and published (RECOMMENDED EXTENSIBLE AUDITABLE)
#16 Sensitive data is not exposed in error responses or log output (REQUIRED EXTENSIBLE AUDITABLE)
Was this helpful?