logo

BSAFSS


Summary

The BSA Framework for Secure Software (BFAFSS) offers an outcome-focused, standards-based risk management tool to help stakeholders in the software industry. The framework also helps software development organizations describe the current state and target state of software security in individual software security products and services. The version used in this section is BSAFSS v1.1, September 2020.


Definitions

DefinitionRequirements
BSAFSS-SC_3-2. Secure Coding (secure software against unsafe functions)
BSAFSS-SC_3-3. Secure Coding (secure software against unsafe functions)
BSAFSS-SC_4-1. Secure Coding (software architecture and design)
BSAFSS-SM_2-1. Measures to ensure visibility, traceability, and security of third-party components
BSAFSS-SM_3-1. Supply chain data is protected
BSAFSS-SM_3-2. Supply chain data is protected
BSAFSS-SM_4-1. Software measures to prevent counterfeiting and tampering
BSAFSS-SM_4-2. Software measures to prevent counterfeiting and tampering
BSAFSS-SM_6-1. Deployment procedures ensure that the usages of software are established
BSAFSS-TC_1-2. Developed software using security tools
BSAFSS-TC_1-6. Developed software using security tools
BSAFSS-IA_1-1. Software development environment authenticates users and operators
BSAFSS-IA_1-2. Software development environment authenticates users and operators
BSAFSS-IA_2-1. Policies to control access to data and processes
BSAFSS-IA_2-2. Policies to control access to data and processes
BSAFSS-SI_1-2. Avoid architectural weaknesses of authentication failure
BSAFSS-SI_1-3. Avoid architectural weaknesses of authentication failure
BSAFSS-SI_1-4. Avoid architectural weaknesses of authentication failure
BSAFSS-SI_1-5. Avoid architectural weaknesses of authentication failure
BSAFSS-SI_2-1. Strong identity
BSAFSS-EN_1-1. Encryption strategy and mechanisms
BSAFSS-EN_2-3. Avoid weak encryption
BSAFSS-EN_2-4. Avoid weak encryption
BSAFSS-EN_2-5. Avoid weak encryption
BSAFSS-EN_3-1. Software protects and validates encryption keys
BSAFSS-EN_3-2. Software protects and validates encryption keys
BSAFSS-EN_3-3. Software protects and validates encryption keys
BSAFSS-AA_1-1. Principle of least privilege
BSAFSS-AA_1-2. Authorization and access controls
BSAFSS-AA_1-3. Authorization and access controls
BSAFSS-AA_2-1. Authorization and access (support controls)
BSAFSS-LO_1-2. Logging of all critical security incident and event information
BSAFSS-LO_1-3. Logging of all critical security incident and event information
BSAFSS-LO_2-2. Implement securely logging mechanisms
BSAFSS-LO_2-3. Implement securely logging mechanisms
BSAFSS-LO_2-4. Implement securely logging mechanisms
BSAFSS-EE_1-3. Error and exception handling capabilities
BSAFSS-VM_3-2. Vulnerability management
BSAFSS-CF_1-4. Secure software installation and operation
BSAFSS-VN_1-2. Vulnerability notification and patching
BSAFSS-VN_3-1. Vulnerability notification and patching (updates are accompanied by advisory messages)
BSAFSS-VN_3-2. Vulnerability notification and patching (updates are accompanied by advisory messages)

Last updated

2023/09/18