Secure Development Policy (A.14.2) - FileHound

Modified on Fri, 16 Feb 2024 at 03:54 PM

Purpose and Scope 

This document outlines rules for secure development of software and systems for our flag ship product FileHound. It applies to all services, architecture, software, and systems under our Information Security Management System (ISMS) and personal data processing activities. All Element3 employees involved in software development and maintenance of FileHound must adhere to this policy.


Secure Development and Maintenance 


Risk Assessment for the Development Process

In addition to standard company Risk Assessments, Solutions Architects & DevOps Engineers must periodically assess risks related to unauthorised access and changes to all development environments, technical vulnerabilities of IT infrastructure systems used at FileHound, and risks associated with any new technologies used in the organisation.


Securing the Development Environment

All development projects must follow an agile design, build, and maintain methodology. Code management processes must be robust and use only company-vetted tools and services. During the development phase, vulnerability scanning and penetration testing must be conducted to identify and remediate potential security weaknesses. 


All FileHound pre-production development and production environments must be separated by either physical or virtual servers that are managed and maintained by the Senior DevOps Engineer and Solutions Architect. All developer, test, and production environments must be securely backed up following internal backup procedures.


Secure Engineering Principles 
The Solutions Architect will establish procedures for secure information system engineering for new and existing FileHound systems, and set minimum security standards that must be followed by all FileHound developers and technical employees.


Secure Coding Practices

All developers must adhere to secure coding practices to ensure that vulnerabilities are not introduced in the development process. Developers must be trained in secure coding principles, such as input validation, error handling, and secure configuration. Solutions Architects must review the code for security issues before release.


Security Requirements

Security requirements for each FileHound project must be documented by Solutions Architects under the Security Requirements Specification section of the new or modified systems documentation.


Data Encryption 

Sensitive data must be properly encrypted during transmission and storage. All encryption keys must be securely managed and protected. The use of encryption protocols and standards must follow industry best practices.


Security Requirements Related to Public Networks 

Solutions Architects are responsible for defining security controls for application services passing over public networks, including authentication systems, confidentiality and integrity of information, and non-repudiation of actions. Controls for online transactions must include preventing incomplete data transmission, unauthorised message alteration, unauthorised message duplication, and unauthorised data disclosure.


Checking and Testing Security Requirements Implementation 

Solutions Architect must define the methodology, responsibilities, and timing for checking whether all security requirements from the Security Requirements Specification and customer contract agreements have been met and whether the system is acceptable for production.


Code Management

To ensure effective source code management, Git must be used for all projects, and our internal GitHub hosting service must be utilised. All GitHub source code access must be authorised by the Solutions Architect to prevent unauthorised access. Access to authorised users must be enforced through multi-factor authentication (MFA) accounts to guarantee the highest level of security. This approach will help us maintain the integrity and confidentiality of our source code, prevent unauthorised changes or breaches, and protect our customers' data.


Version Control

All new FileHound development projects and releases must follow a semantic versioning methodology that is reviewed periodically for compliance by Product Managers and Solutions Architects.


Change Control

Changes in development and system maintenance must comply with the Change Management Policy and Security Procedures.


Protection of Test Data

Confidential and personally identifiable data must not be used as test data, except where approved by the Senior Product Managers, in which case Solutions Architects must define how the data is protected.


Security Training for All Employees 

All employees who work on FileHound software development and maintenance must receive regular security training to ensure that they are aware of the latest threats and best practices. The training program must include topics such as password management, social engineering, and phishing.


Managing Records Kept Based on This Document

Record Name

Storage Location

Person Responsible for Storage

Controls for Record Protection

Retention Time

List of risks related to development process

Company Documentation Portal

Product Manager & Project Lead

Only project members and senior managers can access

3 years for lists that are no longer valid

Security Requirements Specification

Company Documentation Portal

Solutions Architect

Only project members and senior managers can access

3 years for lists that are no longer valid

Procedures for secure information system eng...

Company Documentation Portal

DevOps Engineer

Only project members and senior managers can access

3 years for procedures that are no longer valid

Testing plans

Company Documentation Portal

Product Manager. & Project Lead

Only project members and senior managers can access

3 years for tests that have been performed


Validity and Document Management

The Senior FileHound Product Manager is responsible for this document and must review and update it at least once a year. The effectiveness and adequacy of this document must be evaluated based on the number of incidents arising from failed security controls built into the systems.


Review of this Policy
This Secure Development Policy will be under regular review, and any updates will be placed on the FileHound knowledge base. The last review of this policy was conducted in April 2023.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article