ISO/IEC 27034-6:2016
(Main)Information technology — Security techniques — Application security — Part 6: Case studies
Information technology — Security techniques — Application security — Part 6: Case studies
ISO/IEC 27034-6:2016 provides usage examples of ASCs for specific applications. NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application security.
Technologies de l'information — Techniques de sécurité — Sécurité des applications — Partie 6: Études de cas
General Information
- Status
- Published
- Publication Date
- 04-Oct-2016
- Drafting Committee
- ISO/IEC JTC 1/SC 27/WG 4 - Security controls and services
- Current Stage
- 9093 - International Standard confirmed
- Start Date
- 19-May-2022
- Completion Date
- 14-Feb-2026
Relations
- Effective Date
- 06-Jun-2022
Overview
ISO/IEC 27034-6:2016 - part of the ISO/IEC 27034 series on application security - delivers practical case studies and usage examples of Application Security Controls (ASCs). Rather than normative prescriptions, this part provides realistic ASC examples (for instance, a Java mobile application code-review ASC), XML representation examples, and guidance on adapting ASCs to an organization’s context. The standard helps organizations implement the Application Security Framework and Organizational Normative Framework (ONF) described across ISO/IEC 27034.
Key topics and technical highlights
- Application Security Controls (ASCs): focused examples showing how to define, structure and use ASCs to address application-level threats.
- ASC representation: examples use the XML data structure recommended in ISO/IEC 27034-5-1 to enable consistent ASC exchange and implementation.
- Case studies included: Java code revision for mobile apps; privacy requirements spanning two countries; integration and implementation of third‑party ASCs; use of the Application Security Life Cycle Reference Model (ASLCRM); and integrating ASCs into a secure development life cycle (SDLC).
- Application levels of trust and information classification: practical categorization examples (e.g., baseline → private) and how ASC selection maps to those tiers.
- Secure development life cycle phases: mapped ASC activities across preparation, requirements, design, implementation, verification, release and sustainment phases.
- Annex A: informative XML examples supporting the case studies and demonstrating ASC encoding for tool or process integration.
- Audience and role guidance: targeted at domain experts, application security teams, developers, auditors and organizational ONF committees responsible for ASC creation, validation and maintenance.
Practical applications - who uses this standard
- Application security teams and developers: adopt the ASC examples (e.g., code review ASC for Java mobile apps) as starting points for project-level controls.
- Security architects and ONF committees: adapt case-study patterns to build an organizational ASC library and policy mapping.
- Tool vendors and integrators: use the XML examples to support ASC import/export and automation across SDLC tools.
- Auditors and compliance teams: validate that ASCs have been defined and implemented consistently across application lifecycles.
Related standards (if applicable)
- ISO/IEC 27034 series (general framework and other parts) - ISO/IEC 27034-1 (concepts/definitions) and ISO/IEC 27034-5-1 (ASC XML data structure) are specifically referenced in the case-study context.
By providing concrete ASC templates, XML examples and SDLC mappings, ISO/IEC 27034-6:2016 helps organizations translate application-security principles into implementable controls and repeatable processes.
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

Bureau Veritas
Bureau Veritas is a world leader in laboratory testing, inspection and certification services.

DNV
DNV is an independent assurance and risk management provider.
Sponsored listings
Frequently Asked Questions
ISO/IEC 27034-6:2016 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology — Security techniques — Application security — Part 6: Case studies". This standard covers: ISO/IEC 27034-6:2016 provides usage examples of ASCs for specific applications. NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application security.
ISO/IEC 27034-6:2016 provides usage examples of ASCs for specific applications. NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application security.
ISO/IEC 27034-6:2016 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 27034-6:2016 has the following relationships with other standards: It is inter standard links to ISO 15384:2018. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 27034-6:2016 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 27034-6
First edition
2016-10-01
Information technology — Security
techniques — Application security —
Part 6:
Case studies
Technologies de l’information — Techniques de sécurité — Sécurité
des applications —
Partie 6: Études de cas
Reference number
©
ISO/IEC 2016
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 1
5 Security guidance for specific applications . 1
5.1 General . 1
5.2 ASC example: Java code revision for mobile applications . 2
5.2.1 General. 2
5.2.2 Purpose . 2
5.2.3 Context . 2
5.2.4 ORGANIsation Information classification guidelines . 2
5.2.5 Levels of trust included in the ORGANIsation ASC Library . 2
5.2.6 Outcome . 3
5.2.7 ORGANIsation stakeholders involved in these ASCs . 4
5.2.8 Descriptions of sample ASCs . 6
5.3 Case study: Developing ASCs to address the issue of privacy for two countries .19
5.3.1 General.19
5.3.2 Purpose .19
5.3.3 Context .19
5.4 Case study: Integration of third-party ASCs .21
5.4.1 General.21
5.4.2 Purpose .21
5.4.3 Context .21
5.5 Case study: Using the ASLCRM to facilitate implementation of ASCs by different
development groups inside an organization .24
5.5.1 General.24
5.5.2 Purpose .24
5.5.3 Context .24
5.6 Case study: Implementation of third-party ASCs in a secure development life
cycle process .26
5.6.1 General.26
5.6.2 Purpose .26
5.6.3 Context .26
5.6.4 Preparation phase (1.00) .27
5.6.5 Requirements phase (2.00) .30
5.6.6 Design phase (3.00) . .31
5.6.7 Implementation phase (4.00) .34
5.6.8 Verification phase (5.00).36
5.6.9 Release phase (6.00).37
5.6.10 Sustainment, support and servicing phase (7.00) .38
Annex A (informative) XML examples for case studies in 5.2 .41
Bibliography .70
© ISO/IEC 2016 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment,
as well as information about ISO’s adherence to the World Trade Organization (WTO) principles in the
Technical Barriers to Trade (TBT) see the following URL: www.iso.org/iso/foreword.html.
The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 27,
IT Security techniques.
A list of all parts in the ISO/IEC 27034 series can be found on the ISO website.
iv © ISO/IEC 2016 – All rights reserved
Introduction
0.1 General
There is an increasing need for organizations to focus on protecting their information at the application
level. A systematic approach towards increasing the level of application security provides an
organization with evidence that information being used or stored by its applications is being adequately
protected.
ISO/IEC 27034 (all parts) provides concepts, principles, frameworks, components and processes to
assist organizations in integrating security seamlessly throughout the life cycle of their applications.
The application security control (ASC) is one of the key components of this document.
To facilitate the implementation of ISO/IEC 27034 (all parts) application security framework and the
communication and exchange of ASCs, a formal structure should be defined for representing ASCs and
certain other components of the framework.
0.2 Purpose
The purpose of this document is to provide examples of security guidance for organizations to acquire,
develop, outsource and manage security for their specific applications through their life cycle.
0.3 Targeted Audiences
0.3.1 General
The following audiences will find values and benefits when carrying their designated organizational roles:
a) domain experts.
0.3.2 Domain experts
Domain experts contributing knowledge in application provisioning, operating or auditing, who need to
a) participate in ASC development, validation and verification,
b) participate in ASC implementation and maintenance, by proposing strategies, components and
implementation processes for adapting ASCs to the organization’s context, and
c) validate that ASCs are useable and useful in application projects.
© ISO/IEC 2016 – All rights reserved v
INTERNATIONAL STANDARD ISO/IEC 27034-6:2016(E)
Information technology — Security techniques —
Application security —
Part 6:
Case studies
1 Scope
This document provides usage examples of ASCs for specific applications.
NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to
create their own ASCs to assure the application security.
2 Normative references
There are no normative references cited in this document.
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27034-1 apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— IEC Electropedia: available at http://www.electropedia.org/
— ISO Online browsing platform: available at http://www.iso.org/obp
4 Abbreviated terms
ASC application security control
ASLC application security life cycle
ASLCRM application security life cycle reference model
ONF organization normative framework
5 Security guidance for specific applications
5.1 General
Guidelines play an important role for companies trying to implement any best practice or ISO standard
because they instruct how to institutionalize the practices or rules and, sometimes, the guidance is
based on common examples.
Companies benefit from this guidance as it demonstrates, as a practical example, how to structure ASCs
for specific applications using the recommended XML data structure defined in ISO/IEC 27034-5-1 and
for the implementation of the Organizational Normative Framework.
© ISO/IEC 2016 – All rights reserved 1
5.2 ASC example: Java code revision for mobile applications
5.2.1 General
Code review seams trivial but when an application is built from thousands of lines of code, it may be
unproductive and/or too expensive to revise everything.
This example presents an ASC designed by a fictive organization called ORGANIsation Inc. This ASC
implements the security activity of code review.
5.2.2 Purpose
The purpose of 5.2 is to provide an intuitive description of an example ASC named “Code Review” for an
organization developing Java mobile applications. For the sake of brevity and readability, a simplified
subset of the ASC is presented in English only (language=”EN”), but the ASC requirements defined in
ISO/IEC 27034-5 allows any object in an ASC to be described in any characters sets, as presented by the
Table A.1.
5.2.3 Context
ORGANIsation Inc. is an international organization developing Java mobile applications for its own
use and on behalf of its clients. ORGANIsation software development offices are located in Montreal,
Vancouver and Moscow. For this reason, ORGANIsation’s policy is that any development documentation,
guideline or training should be available in English, French and Russian languages.
ORGANIsation’s implementation strategy for ISO/IEC 27034 (all parts) prioritizes the design of ASCs for
reducing security vulnerabilities in Java mobile code. The ORGANIsation ONF committee mandates the
Application Security Department (ASD) to design and submit Java code review ASCs.
5.2.4 ORGANIsation Information classification guidelines
ORGANIsation utilizes approved internal classification guidelines for classifying the information into
four levels:
a) restricted;
b) confidential;
c) secret;
d) top secret.
5.2.5 Levels of trust included in the ORGANIsation ASC Library
ORGANIsation had previously conducted an organization-wide security risk assessment, for the purpose
of which it divided its applications into six categories according to their impact on organizational risk.
Following this, domain experts mandated by the ONF committee decided to use those six categories as
a template for defining ORGANIsation’s application levels of trust. An informal definition along with a
descriptive label for each level of trust is given in Table 1.
2 © ISO/IEC 2016 – All rights reserved
Table 1 — ORGANIsation’s application levels of trust
Level of
Name Description
trust
0 Baseline All ORGANIsation’s applications shall comply with this Level of Trust.
1 Isolated — Local network This Level of Trust is appropriate for applications used on isolated
only corporate networks, with no connection to external networks.
2 Low — Internet, public This Level of Trust is appropriate for Internet-facing applications
information only sharing public information without any privacy concern.
3 Medium — Internet, corpo- This Level of Trust is appropriate for Internet-facing, transactional
rate users applications used by corporate users, allowing access to corporate
services, user files and/or transactions under $5 000.
4 High — Secure transactions This Level of Trust is appropriate for Internet-facing, transactional
and privacy protection over applications, used by corporate users, allowing access to user pri-
Internet vate information and/or transactions from $5 000 to $25 000.
5 Private This Level of Trust is appropriate for transactional applications
requiring highly secure transactions, privileged access and/or se-
cure critical storage. Access to critical information and/or transac-
tions over $25 000 is authorized.
5.2.6 Outcome
The application security department was mandate to select and acquire an automatic source code
review tool suitable for the Java language, with user-configurable review rules. After analysis of vendor
propositions, the department selected a tool named “Efficient-Reviewer version 2.2”.
At the end of this project, version 1.0 of five ASCs were developed and implemented.
Table 2 — ORGANIsation’s ASCs for code review
ID Name Level of trust Description
ORGANIsa- Code Review — Baseline This ASC is used to help developers
tion-ASD-042 to perform a code review control for
— Isolated – Local network only
JAVA applications.
— Low – Internet, public
information only
— Medium – Internet,
corporate users
— High – Secure transactions and
privacy protection over Internet
— Private
ORGANIsa- Code Classification — Baseline Classify all Java classes in the
tion-ASD-043 packages needed by the application.
— Isolated – Local network only
— Low – Internet, public Any class should inherit its
information only classification from the highest-classi-
fied information it processes.
— Medium – Internet,
corporate users
— High – Secure transactions and
privacy protection over Internet
— Private
© ISO/IEC 2016 – All rights reserved 3
Table 2 (continued)
ID Name Level of trust Description
ORGANIsa- Basic Automatic — Baseline This ASC is used to help developers
tion-ASD-044 Code Review to implement a code review control
— Isolated – Local network only
for Java applications by providing an
automatic
— Low – Internet, public
source code security review process
information only
for Java classes classified as “Strate-
gic” and “Critical”.
ORGANIsa- Advanced — Medium – Internet, This ASC is used to help developers
tion-ASD-045 Automatic corporate users to implement a code review control
Code Review for Java applications by providing an
— High – Secure transactions and
automatic
privacy protection over Internet
source code security review process
— Private for all of the application’s Java classes.
ORGANIsa- Manual Code — High – Secure transactions and This ASC is used to help developers
tion-ASD-046 Review privacy protection over Internet to implement a code review control
for Java applications by providing a
— Private
manual source code security review
process for Java classes classified as
“Strategic” and “Critical”.
NOTE The ASC with ID “ORGANIsation-ASD-042” is the root of the code-review ASC hierarchy.
5.2.7 ORGANIsation stakeholders involved in these ASCs
For each of these ASCs, the following responsibilities were determined.
NOTE This subclause consist consist of informal descriptions of ASC data elements, followed by the formal
description of same using XML notation.
Table 3 — Names and responsibilities of Java code review ASCs stakeholders
Role/responsibility Name Notes/ORGANIsation directives
Author Jules Vernes
Owner Douglas Adams — M. Adams requested to start numbering
ORGANIsation’s ASCs from 42.
Creation Request: Herbert George Wells — A PDF version of the creation request, explaining
why this ASC is required by the organization will be
included in each ASC.
— The PGP signature of M. Wells will be required to
seal the ASC.
— The date when this activity will be completed
shall be specified.
Design Jules Verne
Validation Arthur C. Clarke
Development Frank Herbert
Verification Ray Bradbury — The security activity and the measurement and
verification activity shall both be verified in both
William Gibson
languages.
Approval Robert Heinlein — The PGP signature of M. Heinlein will be required
to seal the ASC.
Final Owner approval Douglas Adams — The PGP signature of the owner is required to
seal the ASC.
4 © ISO/IEC 2016 – All rights reserved
Table 3 (continued)
Role/responsibility Name Notes/ORGANIsation directives
Published for training Isaac Asimov
Active Mary Shelley
Expired Not defined.
Additional information recorded in each ASC includes coordinates of each actor (department, e-mail
address, phone number, physical address) and the completion date for each activity.
The ASC structure allows each version of an ASC to be electronically signed for integrity purposes.
ORGANIsation directives in Table 3 specify which electronic signatures are mandatory. This provides
assurance that critical stages of the ASC’s life cycle were performed and verified according to
ORGANIsation’s policy.
In Figure 1, the cloud-shaped region illustrates the part of the ASC protected by electronic signatures.
Figure 1 — Integrity scope of stakeholder’s electronic signatures
See Table A.2.
“ASC ORGANIsation-ASD-042 - Code Review” is a “Head ASC” and does not contain any security activity
or verification and measurement activity. Instead, it refers to four children ASCs, which are required to
implement code review in the organization’s Java development process. Figure 2 illustrates this concept
of ASC hierarchy. It is also to be noted that the “Head ASC” omits some of the mandatory ASC attributes
defined by ISO/IEC 27034-1:2011, Figure 6. These will be provided by the child ASCs.
© ISO/IEC 2016 – All rights reserved 5
Figure 2 — Code review ASC graph
See Table A.3.
5.2.8 Descriptions of sample ASCs
5.2.8.1 General
This subclause describes the head ASC (Code review) and its four children ASCs developed and
implemented in the ORGANIsation ASC Library.
5.2.8.2 ASC ORGANIsation-ASD-042: Code review
ASC Code Review
ASC UID ORGANIsation-ASD-042
Identification
ASC UID ORGANIsation-ASD-042
ASC name Code Review
Version 1.3.6.0
Date 2016-01-04
Description This ASC is used to help developers to perform a code review control for JAVA applications.
Author Jules Verne
Application Security Department
ORGANIsation inc.
1234 Street ave W, Beautiful city, Quebec, Canada
Email office: JVernes@ORGANIsation.com
Phone office: +1.234.567.8901
6 © ISO/IEC 2016 – All rights reserved
Owner Douglas Adams
Application Security Department
ORGANIsation inc.
1234 Street ave W, Beautiful city, Quebec, Canada
Email office: DAdams@ORGANIsation.com
Phone office: +1.109.876.5432
Parents None
Children ORGANIsation-ASD-043
ORGANIsation-ASD-044
ORGANIsation-ASD-045
ORGANIsation-ASD-046
See Table A.4.
Approval-stages (See the ASC approval-stages XML example in 5.2.7.)
Objective
Objective description Top-level ASC whose objective is to group the various leaf ASCs related to
code review in Java.
Requirements addressed -- Content removed for simplification --
Assigned Levels of trust 0, 1, 2, 3, 4, 5
Context of use Technological context
Levels of trust range Level of Name Description
Trust
0 Baseline All ORGANIsation’s applications shall
comply with this Level of Trust.
1 Isolated – Local This Level of Trust is appropriate for
network only applications used on isolated corporate
networks, with no connection to external
networks.
2 Low – Internet, This Level of Trust is appropriate for
public information Internet-facing applications sharing
only public information without any privacy
concern.
3 Medium – Internet, This Level of Trust is appropriate for
corporate users Internet-facing, transactional applica-
tions used by corporate users, allowing
access to corporate services, user files
and/or transactions under $5 000.
4 High – Secure trans- This Level of Trust is appropriate for In-
actions and privacy ternet-facing, transactional applications,
protection over used by corporate users, allowing access
Internet to user private information and/or trans-
actions from $5 000 to $25 000.
© ISO/IEC 2016 – All rights reserved 7
5 Private This Level of Trust is appropriate for
transactional applications requiring
highly secure transactions, privileged
access and/or secure critical storage.
Access to critical information and/or
transactions over $25 000 is authorized.
(See Table 2)
Pre-conditions -- Content removed for simplification --
See Table A.5.
Security Activity None.
Verification None.
Measurement
5.2.8.3 ASC ORGANIsation-ASD-043: Code classification
ASC Code Classification
ASC ID ORGANIsation-ASD-043
Identification
ASC UID ORGANIsation-ASD-043
ASC name Code Classification
Date 2015-12-25
Description Classify all Java classes in the packages needed by the application.
Any class should inherit its classification from the highest-classified information it
processes.
Version 2.6.1.1
Author -- Content removed for simplification --
Owner -- Content removed for simplification --
Parents ORGANIsation-ASD-042
Children None
Approval-stages (See the ASC approval-stages XML example in 5.2.7.)
Objective
Objective description Define the scope of the code review.
Requirements addressed Business requirements: ORGANIsation Development guidelines v2.1, Section
5.6 – Application components classification.
Assigned Levels of trust 0, 1, 2, 3, 4, 5
Levels of trust range (See Table 2)
Pre-conditions -- Content removed for simplification --
8 © ISO/IEC 2016 – All rights reserved
See Table A.6.
Security activity
Name (what) Classify classes and packages
Description Identify and categorize the application’s Java classes and packages.
Target information Application Data (see ISO/IEC 27034-1:2011, 6.3)
group
Target information Development documentation
sub-group
Target information Application’s Java code architecture
group name
Outcome general Categorized classes and packages information merged in the application’s Java
description code architecture documentation.
Supporting expert Orson Scott Card
ressource
ORGANIsation inc.
Email: Orson.Scott.Card@ORGANIsation.com
Complexity COMPLEX
Complexity description This activity should be performed by someone able to identify, from the appli-
cation architecture documents, what information is manipulated by each Java
class and to identify security risks that may threaten sensitive information.
Global estimated — Average of 1 h to classify and document 10 Java classes.
effort (how much)
— Average of 15 h to update the Application Security Risk Analysis.
Role (who) APPLICATION ARCHITECT
Responsibility RESPONSIBLE
Required qualifications 1. Passed an examination on the ORGANIsation Java coding best practices.
2. Minimum 5 years experience in Java Development.
3. Active CSSLP Certification.
Pre-condition — The application classes and packages identification section of the Applica-
tion design document is completed.
— A list of categorized information groups involved by the application al-
ready exists.
Security activity Classify the application classes to be developed or maintained in this project.
description (how)
1. Identify contexts, roles, and information involved with the application
module. Ref.: ORGANIsation Development guidelines v2.1.
2. Realize or update the Application Security Risk Analysis.
3. Classify all classes in the packages needed by the application in the Ap-
plication Class Classification section of the Application design document. Ref.:
ORGANIsation Code Classification Guide, v1.4, and Application Class Classifica-
tion section – Template v2.3.
Localization (where) — Application development environment
© ISO/IEC 2016 – All rights reserved 9
Moment (when) AFTER: The detailed application architecture is completed.
Supporting documents 1. ORGANIsation Development guidelines v2.1.PDF.
2. ORGANIsation Code Classification Guide, v1.4.PDF.
3. Application Class Classification section – Template v2.3.RTF.
Artefacts (what) 1. Document: The Application Module Classification section, in the Applica-
tion design document, describing for all application modules, their class classi-
fication value from “Not critical” to “Critical”.
2. Document: The classification method, templates and examples are de-
scribed in the classification Guide, referenced within this ASC.
See Table A.7.
Verification
measurement
Name (what) Classes and packages classification verification.
Description Verify if the application’s Java classes and packages produced or modified were
adequatly categorized.
Target information Application Data (See ISO/IEC 27034-1:2011, 6.3)
group
Target information Application development documentation
sub-group
Target information Application’s Java code architecture
group name
Outcome general These two documents are produced or updated: the Application security risk
description analysis and the Application design document.
Supporting expert Ray Bradbury
ressource
Email: Ray.Bradbury @ORGANIsation.com
Complexity COMPLEX
Complexity description This activity should be done by someone who is able to validate, from applicaton
architecture documents, what information is manipulated in every Java classes
and to validate security risks that may threaten sensitive information.
Global estimated — An average of 6 h to validate the contexts and revise the risk analysis and
effort (how much) an average of 10 min to approve/reject each class and package.
— Around 12 h/project.
Activity specification — Classify application’s classes and components.
Ref.: ORGANIsation Code Classification Guide, v1.4
Role (who) APPLICATION SECURITY ARCHITECT
Responsibility ACCOUNTABLE and RESPONSIBLE
Qualifications required 1. Passed an examination on the ORGANIsation Java coding best practices.
2. Passed an examination on the secure application architecture.
3. Active CSSLP Certification.
Pre-condition — The Application’s Java code architecture documentation includes a complete
categorized classes and packages information.
10 © ISO/IEC 2016 – All rights reserved
Verification- Revise and approve Application Module Classification section, in the Application
measurement design document:
activity
1. validate the contexts, roles and information involved with this module;
description (how)
2. revise the application risk analysis;
3. for each class, reject or approve the classification and mark accordingly.
Localization (where) — Application development environment
Moment (when) Before coding.
Supporting documents 1. ORGANIsation Code Classification Guide, v1.4.PDF
Artefacts (what) 1. Updated Application security risk analysis document.
2. Approved Application Module Classification section, in the Application
design document.
See Table A.8.
5.2.8.4 ASC ORGANIsation-ASD-044: Basic automatic code review
ASC Basic Automatic Code Review
ASC ID ORGANIsation-ASD-044
Identification
ASC UID ORGANIsation-ASD-044
ASC name Basic Automatic Code Review
Version 1.3.0.0
Date 2015-12-25
Description This ASC is used to help developers to implement a code review control
for Java applications by providing an automatic source code security re-
view process for Java classes classified as “Strategic” and “Critical”.
Author -- Content removed for simplification --
Owner -- Content removed for simplification --
Parents ORGANIsation-ASD-042
Children None
Approval-stages (See the ASC approval-stages XML example in 5.2.7.)
Objective
Objective description Defines the activities (and their verification) involved in basic automatic
code review.
Requirements addressed 1. This control is required for compliance with PCI-DSS 2.0, section xx.xx.
Assigned Levels of trust 0, 1, 2
Context of use Technological context
Levels of trust range (See Table 2)
Pre-conditions Java classes in the packages needed by the application are categorized.
Security Activity
Name (what) Automatic code review (basic)
Description Run an automatic code review only on Java classes classified as “Strate-
gic” and “Critical”.
Target information group Application data
Target information Source code
sub-group
© ISO/IEC 2016 – All rights reserved 11
Target information group Java class and packages
name
Outcome general Code review reports produced by the tool.
description
Supporting expert Team leader
ressource
Complexity MEDIUM
Complexity description The developer shall verify the version of the rules file loaded in the tool
before running the automatic review on the Java code.
Global estimated effort An average of 20 min per class.
(how much)
Role (who) DEVELOPER
Responsibility RESPONSIBLE
Required qualifications 1. More than 3 months experience in Java programming.
2. Passed an examination on CR tools utilization.
3. Passed an examination on the ORGANIsation Java coding best
practices.
Pre-condition The application “Efficient-Reviewer version 2.2” is installed and config-
ured on the user’s station.
Security activity For all java classes classified as “Strategic” and “Critical”, developed by
description (how) the developer, run the security code review tool as a unit test activity.
1. After the developer has completed coding and compiling the class
without any error.
2. Start the security code review tool and load rules file XXXY-053-JAVA.
3. Perform the automatic code review.
4. Save the report produced by the code review tool.
5. Analyze the report and correct all errors and warnings detected.
6. Generate a single hash code from the Java code and the produced
report files.
7. Check-in the hash code and the report with the Java code.
Localization (where) Developper workstation
Moment (when) BEFORE: APPLICATION LAYER, REALIZATION STAGE, DEVELOPMENT
ACTIVITY AREA, CODING ACTIVITY, COMPILE CODE.
Supporting documents 1. File: XXXY-053-JAVA.rules
Artefacts (what) 1. A security report without any error or warning.
2. A check-in including the verified code, the report produced by the
tool and the hash code of these two files.
Verification Measurement
Name (what) Basic automatic code review verification
Description Check the reports produced by the code review tool for all classes that were
classified as “Strategic” and “Critical” for this application project module
Target information group Application data
Target information Source code
sub-group
Target information group Signed Java class and packages
name
Verification tools report
12 © ISO/IEC 2016 – All rights reserved
Target information group Once the code review is completed, the tool will sign the source code and
description save the signature in the report. The source code file, the report and the
signature will have to be verified.
Outcome general Target code modules are verified or rejected. When verified, they are
description
migrated to the “preliminary tests” environment.
Supporting expert res- Team leader
source
Complexity EASY
Complexity description Make sure the tool report is in the same folder of its related source code
before starting the verification.
Global estimated effort Average of 4 h per migration.
(how much)
Role (who) AUDITOR
Responsibility RESPONSIBLE
Required qualifications Should have followed the ORGANIsation components migration training.
Pre-condition The application module “Efficient-Reviewer version 2.2 – Hash code
validation” shall have been installed configured on the source code server
for the project.
Security activity description Check the reports produced by the code review tool for all classes that
(how) were classified as “Strategic” and “Critical” for this application project
module and migrate them in “preliminary tests” environment.
With the Code Revision tool “Efficient-Reviewer version 2.2”
1. Identify packages to migrate.
2. For each package
a. verify that each class has a log report, and
b. verify that each log report contains no error or warning.
If so,
i. Verify that the hash code associated with the package file and the
report file produced with the code revision tool is correct.
ii. If so, set the flag associate with the package file as “Verified” in
the versioning system.
If not,
iii. Set the class Flag associate with the package file as “Rejected” in
the versioning system.
iv. Send an email to the programmer.
3. Are all package files flagged as “Verified”?
If so,
a. Migrate the module, and
b. Send an email to the project manager.
If not,
a. Cancel the migration, and
b. Send an email to the project manager.
Localization (where) Development environment, project source code server
Moment (when) BEFORE, APPLICATION SUPPLY LEVEL, TRANSITION STAGE, MODULE
MIGRATION IN TEST ENVIRONMENT.
Artefacts (what) List of application project packages in this module, with their updated
flag status.
© ISO/IEC 2016 – All rights reserved 13
5.2.8.5 ASC ORGANIsation-ASD-045: Advanced Automatic Code Review
ASC Advanced Automatic Code Review
ASC ID ORGANIsation-ASD-045
Identification
ASC UID ORGANIsation-ASD-045
ASC name Advanced Automatic Code Review
Date 2015-12-25
Description This ASC is used to help developers to implement a code review control for Java
applications by providing an automatic source code security review process for
all of the application’s Java classes.
Version 1.0.0.0
Author -- Content removed for simplification --
Owner -- Content removed for simplification --
Parents ORGANIsation-ASD-042
Children None
Approval-stages (See the ASC approval-stages XML example in 5.2.7.)
Objective
Objective description Defines the activities (and their verification) involved in advanced automatic
code review.
Requirements addressed This control is required for compliance with PCI-DSS 2.0, section xx.xx.
Assigned Levels of trust 3, 4, 5
Levels of trust range (See Table 2)
Pre-conditions Java classes in the packages needed by the application were classified.
Security Activity
Name (what) Automatic Code Review (advanced)
Description Run a full automatic code review on all Java classes written by the developer.
Target information Application data
group
Target information Source code
sub-group
Target information Java class and packages
group name
Outcome general Code review reports produced by the tool.
description
Supporting expert Team leader
ressource
Complexity MEDIUM
Complexity description The developer shall verify the version of the rules file loaded in the tool before
running the automatic review on the Java code.
Global estimated effort An average of 20 min per class.
(how much)
Role (who) DEVELOPER
Responsibility RESPONSIBLE
Required qualifications 1. More than 3 months experience in Java programming.
2. Passed an examination on CR tools utilization.
3. Passed an examination on the ORGANIsation Java coding best practices.
14 © ISO/IEC 2016 – All rights reserved
Pre-condition Application “Efficient-Reviewer version 2.2” is installed and configured on the
user’s station.
Security activity For all Java classes developed by the developer, run the security code review
description (how) tool, as a unit test activity.
1. After the developer has completed coding and compiling the class without
any error.
2. Start the security code review tool and load rules file XXXY-053-JAVA.
3. Perform the automatic code review.
4. Save the report produced by the code review tool.
5. Analyze the report and correct all errors and warnings detected.
6. Generate a single hash code from the Java code and the produced report files.
7. Check-in the hash code and the report with the Java code.
Localization (where) Developper’s workstation
Moment (when) BEFORE: APPLICATION LAYER, REALIZATION STAGE, DEVELOPMENT ACTIVITY
AREA, CODING ACTIVITY, COMPILE CODE.
Supporting documents 1. File: XXXY-053-JAVA.rules
Artefacts (what 1. A produced security report without any error or warning.
outcomes)
2. A check-in including the verified code, the report produced by the tool and
the hash code of these two files.
Verification
Measurement
Name (what) Advanced automatic code review verification
Description Check the reports produced by the code review tool for all classes that were
classified as “Strategic” and “Critical” for this application project module
Target information Application data
group
Target information Application data
group name
Target information Source code
sub-group
Target information Signed Java class and packages
group description
Verification tools report
Target information Once the code review is completed, the tool will singed the source code and save
group classification the signature in the report. The source code file, the report and the signature
will have to be verified.
Outcome general Target code modules are verified or rejected. When verified, they are migrated
description to the “preliminary tests” environment.
Supporting expert Team leader
ressource
Complexity EASY
Complexity description Make sure the tool report is in the same folder as its related source code before
starting the verification.
Global estimated effort Average of 10 h per migration.
(how much)
Role (who) AUDITOR
Responsibility RESPONSIBLE
Required qualifications Should have received the ORGANIsation components migration training.
© ISO/IEC 2016 – All rights reserved 15
Pre-condition The application “Efficient-Reviewer version 2.2 – Hash code validation module”
is installed and configured on the user’s station.
Security activity Check the reports produced by the code review tool for all classes for this ap-
description (how) plication project module and migrate them in “preliminary tests” environment.
With the Code Revision tool “ Efficient-Reviewer version 2.2”
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...