Application Security Testing Procedure (ENG-PROC-001)

1. Purpose

The purpose of this procedure is to detail the process for conducting static application security testing (SAST), dynamic application security testing (DAST), and penetration testing to identify and remediate security vulnerabilities in applications.

2. Scope

This procedure applies to all company-developed applications that process or store sensitive customer data.

3. Overview

This procedure outlines the security testing requirements for applications, including automated security scans integrated into the development process and periodic security assessments to identify and remediate vulnerabilities.

4. Procedure

4.1 Automated Security Testing

Step Who What
1 Development Team Integrates automated security scanning tools into the development pipeline to check code for common vulnerabilities.
2 Development Team Reviews security scan reports and addresses high-severity findings before production deployment.
3 Development Team Documents remediation efforts and tracks resolution of identified security issues.

4.2 Security Assessments

Step Who What
1 IT Manager/Security Officer Conducts or arranges annual security assessments for applications handling sensitive data.
2 IT Manager/Security Officer Reviews assessment findings and prioritizes remediation based on risk level.
3 Development Team Implements remediation plan for identified vulnerabilities within established timeframes.

5. Standards Compliance

Procedure Step(s) Standard/Framework Control Reference
4.1 - 4.2 SOC 2 Trust Services Criteria CC7.1 - System Operations

6. Artifact(s)

Security scan reports and annual security assessment documentation with remediation tracking.

7. Definitions

Security Scanning: Automated tools that analyze application code or running applications to identify potential security vulnerabilities.

Security Assessment: Comprehensive evaluation of application security including testing and review of security controls.

8. Responsibilities

Role Responsibility
Development Team Implements security scanning, reviews findings, and remediates identified vulnerabilities.
IT Manager/Security Officer Manages security assessments and provides guidance on vulnerability remediation priorities.