DPWAT-ISMS-POL-006 v1.0

Secure Development Policy

Document ID: DPWAT-ISMS-POL-006
Version: 1.0
Owner: Process Owners (RA) + CISO — Timo Andreas Bejan
Approved by: Administrator (ADM) — Anna Boros
Effective date: 2025-10-15
Next review: 2027-02-01 (or on major change)

1. Scope

This policy covers software development and delivery activities performed by DP WAT, including customer projects and DP WAT-owned internal tooling.

2. Baseline secure development controls

3. Code review approach (risk-based)

DP WAT does not mandate peer review for every change. Instead:

Any exceptions to the above (e.g., emergency changes) must be documented as a change record and, if needed, a risk acceptance.

4. Test data and data masking

5. Security testing

Static analysis and dependency scanning - Static code analysis is performed on most projects. - IDE tools (JetBrains) and GitHub dependency alerts flag vulnerable dependencies. - Dependency warnings are taken seriously; code is patched and dependencies updated promptly.

Penetration testing - Third-party penetration testing is recommended for customer projects based on risk. - Preferred supplier: S.C. FOX SYSTEMS S.R.L. (see supplier register SUP-0016). - When a customer opts out of paid testing, DP WAT records the decision and residual risk.

Security scanning scope - SAST/DAST/dependency/secret scanning is performed based on project risk and customer requirements.

Functional testing - DP WAT employs unit tests, integration tests, end-to-end tests, and manual QA as appropriate. - No fixed coverage requirements; testing scope and depth is determined per project based on risk, complexity, and customer requirements.

6. Secure architecture and engineering principles

DP WAT applies the following principles when designing and building systems:

Defense in depth - Apply multiple layers of security (network, application, data). - Do not rely on a single control to protect assets.

Secure defaults and least privilege - Configure systems to deny by default; access is opt-in. - Apply least privilege to IAM roles, service accounts, and policies via IaC. - Use cloud provider policy frameworks (AWS IAM, Google Cloud IAM, Cloudflare access policies).

Environment isolation - Maintain isolated environments (development, staging, production). - Separation is implemented via separate AWS accounts where feasible; at minimum, separate database/data layer. - Production credentials and data are not used in non-production environments. - Environments are defined via IaC (Terraform) and version-controlled.

Fail secure - Design systems to fail closed (deny access) rather than fail open.

Input validation - Validate input on both client and server side. - Sanitize data to prevent injection attacks (SQL, XSS, etc.).

Secrets management - No plaintext secrets (see Cryptography & Secrets Policy). - Rotate credentials for critical systems, especially those accessible to developers.

Logging and auditability - Implement logging with appropriate levels (debug, info, warn, error). - Implement audit trails for mutating requests on sensitive operations.

Infrastructure standards - Standard stack: AWS, Terraform (IaC), ECS, CloudFront, Application Load Balancers. - TLS termination handled by cloud provider (AWS ALB/CloudFront). - Infrastructure is defined as code and version-controlled.

Dependency management - Keep libraries and dependencies updated. - For projects DP WAT develops: mandatory update cycles every few months. - For consulting engagements: updates recommended but enforcement is customer's responsibility. - Third-party dependencies are chosen based on experience; only reputable, well-maintained libraries are used.

Outsourced development (contractors) - DP WAT engages contractors (PFAs and companies) to perform development work. - Contractors are subject to: policy acknowledgements, NDAs/DPAs as applicable, onboarding/offboarding procedure, access reviews, and security training. - Contractor access is time-bound, follows least privilege, and is revoked at contract end. - See procedure 04.01-people-onboarding-offboarding-and-third-parties.

7. Work on customer-owned devices (cross-customer segregation)

DP WAT acknowledges that customer-owned devices may be used to access DP WAT internal systems and other customers’ code. DP WAT applies the following minimum controls to reduce cross-customer risks: