The organization must store the source code in a central repository.
V1.10 Malicious Software Architectural Requirements.(1.10.1)
Verify that a source code control system is in use,
with procedures to ensure that check-ins are accompanied by issues or change
The source code control system should have access control and identifiable
users to allow traceability of any changes.
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.