Implement Roles and Responsibilities (PO.2)
Implement Supporting Toolchains (PO.3)
Define and Use Criteria for Software Security Checks (PO.4)
Implement and Maintain Secure Environments for Software Development (PO.5)
Protect All Forms of Code from Unauthorized Access and Tampering (PS.1)
Provide a Mechanism for Verifying Software Release Integrity (PS.2)
Archive and Protect Each Software Release (PS.3)
Design Software to Meet Security Requirements and Mitigate Security Risks (PW.1)
Review the Software Design to Verify Compliance with Security Requirements and Risk Information (PW.2)
Reuse Existing, Well-Secured Software When Feasible Instead of Duplicating Functionality (PW.4)
Create Source Code by Adhering to Secure Coding Practices (PW.5)
Configure the Compilation, Interpreter, and Build Processes to Improve Executable Security (PW.6)
Review and/or Analyze Human-Readable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements (PW.7)
Test Executable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements (PW.8)
Configure Software to Have Secure Settings by Default (PW.9)
Identify and Confirm Vulnerabilities on an Ongoing Basis (RV.1)
Assess, Prioritize, and Remediate Vulnerabilities (RV.2)
Analyze Vulnerabilities to Identify Their Root Causes (RV.3)