SV-222648r508029_rule
V-222648
SRG-APP-000516
APSC-DV-003170
CAT II
10
Conduct and document code reviews on the application during development and identify and remediate all known and potential security vulnerabilities prior to releasing the application.
This requirement is meant to apply to developers or organizations that are doing the application development work and have the responsibility for maintaining the application source code. Otherwise, the requirement is not applicable.
Review the system documentation and ask the application representative to describe the code review process or provide documentation outlining the organizations code review process.
If code reviews are conducted with software tools, have the application representative provide the latest code review report for the application.
Ensure the code review looks for all known security flaws including but not limited to:
- format string exploits
- memory leaks
- buffer overflows
- race conditions
- sql injection
- dead/unused/commented code
- input validation exploits
If the organization does not conduct code reviews on the application that attempt to identify all known and potential security issues, or if code review results are not available for review, this is a finding.
V-222648
False
APSC-DV-003170
This requirement is meant to apply to developers or organizations that are doing the application development work and have the responsibility for maintaining the application source code. Otherwise, the requirement is not applicable.
Review the system documentation and ask the application representative to describe the code review process or provide documentation outlining the organizations code review process.
If code reviews are conducted with software tools, have the application representative provide the latest code review report for the application.
Ensure the code review looks for all known security flaws including but not limited to:
- format string exploits
- memory leaks
- buffer overflows
- race conditions
- sql injection
- dead/unused/commented code
- input validation exploits
If the organization does not conduct code reviews on the application that attempt to identify all known and potential security issues, or if code review results are not available for review, this is a finding.
M
4093