Next: 3.1.4 Physical security
Up: 3.1 Local Network: Security
Previous: 3.1.2 Access decisions
All information systems software should be developed in a controlled
and systematic manner according to company standards. The quality and
efficiency of the data processed, and the possible reconfiguration of
the system can all be affected by an inadequate development process.
The risk of security exposures and vulnerabilities is greatly reduced
when the systems development process is itself controlled.