logo

Database

BSAFSS

Last updated: 2023/09/18
logo

The BSA Framework for Secure Software (BFAFSS) offers an outcome-focused, standards-based risk management tool to help stakeholders in the software industry. The framework also helps software development organizations describe the current state and target state of software security in individual software security products and services. The version used in this section is BSAFSS v1.1, September 2020.

Control-Requirement Mapping

DefinitionRequirements
SC_3-2. Secure Coding (secure software against unsafe functions)
SC_3-3. Secure Coding (secure software against unsafe functions)
SC_4-1. Secure Coding (software architecture and design)
SM_2-1. Measures to ensure visibility, traceability, and security of third-party components
SM_3-1. Supply chain data is protected
SM_3-2. Supply chain data is protected
SM_4-1. Software measures to prevent counterfeiting and tampering
SM_4-2. Software measures to prevent counterfeiting and tampering
SM_6-1. Deployment procedures ensure that the usages of software are established
TC_1-2. Developed software using security tools
TC_1-6. Developed software using security tools
IA_1-1. Software development environment authenticates users and operators
IA_1-2. Software development environment authenticates users and operators
IA_2-1. Policies to control access to data and processes
IA_2-2. Policies to control access to data and processes
SI_1-2. Avoid architectural weaknesses of authentication failure
SI_1-3. Avoid architectural weaknesses of authentication failure
SI_1-4. Avoid architectural weaknesses of authentication failure
SI_1-5. Avoid architectural weaknesses of authentication failure
SI_2-1. Strong identity
EN_1-1. Encryption strategy and mechanisms
EN_2-3. Avoid weak encryption
EN_2-4. Avoid weak encryption
EN_2-5. Avoid weak encryption
EN_3-1. Software protects and validates encryption keys
EN_3-2. Software protects and validates encryption keys
EN_3-3. Software protects and validates encryption keys
AA_1-1. Principle of least privilege
AA_1-2. Authorization and access controls
AA_1-3. Authorization and access controls
AA_2-1. Authorization and access (support controls)
LO_1-2. Logging of all critical security incident and event information
LO_1-3. Logging of all critical security incident and event information
LO_2-2. Implement securely logging mechanisms
LO_2-3. Implement securely logging mechanisms
LO_2-4. Implement securely logging mechanisms
EE_1-3. Error and exception handling capabilities
VM_3-2. Vulnerability management
CF_1-4. Secure software installation and operation
VN_1-2. Vulnerability notification and patching
VN_3-1. Vulnerability notification and patching (updates are accompanied by advisory messages)
VN_3-2. Vulnerability notification and patching (updates are accompanied by advisory messages)