![]() Is an additional person reviewing and approving all code change requests submitted to production by the original developer?ĭo secure coding practices take into account common vulnerability classes such as OWASP Top 10? Informationĭo you perform annual penetration testing on the app?ĭoes the app have a documented disaster recovery plan, including a backup and restore strategy?ĭoes your environment use traditional anti-malware protection or application controls?ĪpplicationControls, TraditionalAntiMalwareĭo you have an established process for indentifying and risk ranking security vulnerabilities?ĭo you have a policy that governs your service level agreement (SLA) for applying patches?ĭo you carry out patch management activities according to your patching policy SLAs?ĭoes your enviroment have any unsupported operating systems or software?ĭo you conduct quarterly vulnerability scanning on your app and the infastructure that supports it?ĭo you have a firewall installed on your external network boundary?ĭo you have an established change management process used to review and approve change requests before they are deployed to production? Information from the Microsoft Cloud App Security catalog appears below. Questions or updates to any of the information you see here? Contact us! Which hosting cloud providers does the app use? What is the hosting environment or service model used to run your app? Get Planner tasks from Office 365 Planner & Teams at the tip of your hand, in Outlook for Windows, MAC, IOS or Web mail. Managing and creating tasks has never been easier. ![]() ![]() Get Planner tasks from Office 365 Planner & Teams at the tip of your hand in Outlook on any device. Outlook 2013 or later on Windows, Outlook 2016 or later on Mac, Outlook on iOS, Outlook on the web Information provided by iGlobe to Microsoft: Information ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |