Young hacker smiling

We hack your software

zero false positives

Expert intelligence + Specialized technology
DXST - SAST - IAST - SCA - DevSecOps
White Box - Gray Box - Black Box
Attacking Web Applications, APIs, Mobile Apps
Client-Server, Servers, Networks, IoT Devices
ICS: Industrial Control System

REQ.052 Identify critical components

This documents contains the details of the security requirements related to logical architecture management in the organization. This requirement establishes the importance of identifying critical components related to security in order to protect sensitive information there stored.

Requirement

All critical security components must be identified (TCB).

References

  1. OWASP-ASVS v3.1-1.1 All app components are identified and known to be needed.

  2. OWASP-ASVS v3.1-1.4 Data considered sensitive in the context of the application is clearly identified.


Service status - Terms of Use