Implementation -> Infrastructure Hardening: Checking the sources of used libraries
Risk and Opportunity
Risk: Application and system libraries can have implementation flaws or deployment flaws.
Opportunity: Each libraries source is checked to have a trusted source.
Exploit details
Usefullness: Medium
Required knowledge: Medium (two disciplines)
Required time: Medium
Required resources (systems): Very Low
OWASP SAMM 1 Mapping: SA1-A
OWASP SAMM 2 Mapping: o-environment-management|A|1
ISO27001:2017 Controls Mapping:
- not explicitly covered by ISO 27001 - too specific
- 14.2.1
- 14.2.5