Services
Verify Subresource Integrity
Summary The application must verify the integrity of all externally hosted resources and dependencies using Subresource Integrity (SRI). Description Applications often use resources or have dependencies that are hosted on external servers such as a ...
Restrict access to critical processes
Summary The system must restrict access to system functions that execute critical business processes, allowing only authorized users. Description Systems must enforce access controls on trusted enforcement points. They must also have a clear ...
Verify third-party components
Summary The system must use stable, tested and up-to-date versions of third-party components. Description - The organization must ensure that the version of all of its products and the products provided by third-parties is up to date, stable and ...