Skip to content

Secure Development

Security in SDLC Phases

PhaseSecurity MeasureDescription
DesignThreat modelingIdentification of attack vectors before implementation
ImplementationSecure coding guidelinesOWASP Top 10, input validation, parameterized queries
Code reviewFour-eyes principleSecurity-relevant changes require peer review
TestAutomated security testsSAST, dependency scan in CI/CD
DeploymentHardeningLeast privilege, secure configuration, secrets management
OperationsMonitoring + patchingLog analysis, vulnerability scanning, patch management

CI/CD Security Pipeline

Every commit passes through the following automated checks:

StepTool CategoryBlocks on Failure
Markdown lint / Code lintmarkdownlint, ESLintYes
BuildFramework-specificYes
Dependency auditnpm audit, TrivyOn high/critical
SAST (if applicable)Code analysisOn critical

Dependency Management

MeasureDescription
LockfileAll dependencies are versioned and locked (package-lock.json)
Automated updatesDependabot checks weekly for new versions
Auditnpm audit in CI pipeline, blocks on high/critical
ReviewNew dependencies require justification and review
MinimizationAs few dependencies as possible, preferring actively maintained ones

Secrets Management

RequirementImplementation
No secrets in codePre-commit hook checks for patterns (API keys, passwords)
Environment variablesSecrets via environment variables, not in files
CI/CD secretsVia GitHub Actions Secrets, not in the repository
RotationRegular rotation of API keys and service accounts

CRA SYNERGY

The product-related secure development pipeline (SBOM generation, Cosign signing, multi-engine vulnerability scanning) is documented in the CRA Compliance Documentation. NIS2 secure development standards complement CRA requirements by covering infrastructure and operational codebases.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT