Page 279 - Garis Panduan Perolehan Teknologi Maklumat & Komunikasi (ICT) Kerajaan
P. 279

LAMPIRAN 5A2

                                 CONTOH SCHEDULE UNTUK SECURITY MEASURE


                   I.     Application Development Process

                   The Vendor shall:

                   (a)   provide Purchaser written documentation that:
                          (i)   details  its  application  architecture  and  design,  development  process;
                               and

                          (ii)   identifies the measures that will be taken at each point in that process
                               to  design,  develop,  assure,  maintain,  and  manage  the  application
                               securely;

                   (b)   conduct peer-review of all code by at least one other individual as identified by
                        the Purchaser against the security requirements and  coding guidelines before
                        it is considered ready for testing;

                   (c)   promptly  provide  a  written  report  to  the  Purchaser  on  any  security  issue
                        identified  during  the  application  development  lifecycle,  including,  but  not
                        limited  to,  those  arising  in  connection  with  requirements,  design,
                        implementation,  testing,  deployment,  or  operation;  such  report  shall  be
                        accompanied by a risk assessment and an outline of the actions required to
                        mitigate that risk; and

                   (d)   establish a plan for knowledge transfer to enable the Purchaser to maintain
                        the  secure  operation  of  the  application  once  it  has  been  deployed  into  the
                        production environment.

                   II.    Vulnerabilities, Risks, And Threats

                   The Vendor shall:

                   (a)   utilize  its  best  efforts  to  identify,  document,  and  mitigate  vulnerabilities,
                        threats,  and  risks  as  early  as  possible  during  the  application  development
                        lifecycle;

                   (b)   document  how  it  will  identify  the  key  risks  to  the  information  that  will  be
                        resident in the application and to the functions supported by the application. In
                        order  to  determine  and  prioritize  risks,  enumerate  vulnerabilities,  and
                        understand  the  impact  particular  attacks  might  have  on  the  application,  the
                        Vendor  shall,  at  a  minimum,  conduct  a  threat  assessment  and  analysis  of






                                                             1
   274   275   276   277   278   279   280   281   282   283