Skip to content
GitHubLinkedIn

Secure development (draft)

This page captures draft secure-development expectations that are commonly required for ISO 27001 readiness. It is written to be tool-agnostic and should be refined to match our actual delivery workflow.

  • Starting a new project or environment
  • Changing access paths, authentication, or sensitive data flows
  • Shipping code/config changes to production-like environments
  • Changes are tracked (who/what/why/when).
  • High-risk changes have an explicit reviewer/approver.

See Change management (draft).

  • Never commit secrets to Git.
  • Store credentials only in approved systems (e.g., Vault, where applicable).
  • Access is granted based on role and task.
  • Prefer SSO/MFA when supported by the target system.
  • Keep third-party dependencies and platform components updated within project constraints.
  • Treat advisories as inputs to Vulnerability management.
  • Ensure actions affecting sensitive data can be audited where feasible.
  • Change records (PRs/tickets/releases):
  • Review/approval evidence: