This document is under active development and has not been finalized.
Skip to content

Secure Development

Security in SDLC Phases

PhaseSecurity MeasureDescription
DesignThreat modelingIdentification of attack vectors before implementation
ImplementationSecure coding guidelinesOWASP Top 10, input validation, parameterized queries
Code reviewFour-eyes principleSecurity-relevant changes require peer review
TestAutomated security testsSAST, dependency scan in CI/CD
DeploymentHardeningLeast privilege, secure configuration, secrets management
OperationsMonitoring + patchingLog analysis, vulnerability scanning, patch management

CI/CD Security Pipeline

Every commit passes through the following automated checks:

StepTool CategoryBlocks on Failure
Markdown lint / Code lintmarkdownlint, ESLintYes
BuildFramework-specificYes
Dependency auditnpm audit, TrivyOn high/critical
SAST (if applicable)Code analysisOn critical

Dependency Management

MeasureDescription
LockfileAll dependencies are versioned and locked (package-lock.json)
Automated updatesDependabot checks weekly for new versions
Auditnpm audit in CI pipeline, blocks on high/critical
ReviewNew dependencies require justification and review
MinimizationAs few dependencies as possible, preferring actively maintained ones

Secrets Management

RequirementImplementation
No secrets in codePre-commit hook checks for patterns (API keys, passwords)
Environment variablesSecrets via environment variables, not in files
CI/CD secretsVia GitHub Actions Secrets, not in the repository
RotationRegular rotation of API keys and service accounts

CRA SYNERGY

The product-related secure development pipeline (SBOM generation, Cosign signing, multi-engine vulnerability scanning) is documented in the CRA Compliance Documentation. NIS2 secure development standards complement CRA requirements by covering infrastructure and operational codebases.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT