SA-8 SECURITY ENGINEERING PRINCIPLES
Page last updated:
Compliance with the requirements defined in this control is a deployer responsibility.
Pivotal provides product documentation, including a reference architecture document for each IaaS, that will be useful for deployers fulfilling this organizational requirement.
The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.
Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions.