Software development and operations

MedStack Confidential

Metadata

Applicability

To conduct software development and operations

Implement all operations activities as software development

Make security a key part of software development and operations

Control changes to software and systems

Operate reliable systems with appropriate redundancy and availability

CodeSectionTitleText
ISO A.12.1.3 Capacity management The use of resources shall be monitored, tuned and projections made of future capacity requirements to ensure the required system performance.
ISO A.17.2.1 Availability of information processing facilities Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.

Perform testing of software

Have PHI only on production systems

Do not outsource development

Respect Intellectual Property Rights and licenses

Enforcement

References

CodeSectionTitleText
ISO A.9.4.5 Access control to program source code Access to program source code shall be restricted.
ISO A.12.6 Technical vulnerability management Objective: To prevent exploitation of technical vulnerabilities.
ISO A.17.2 Redundancies Objective: To ensure availability of information processing facilities.
SOC 2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. The following points of focus, specifically related to all engagements using the trust services criteria, highlight important characteristics relating to this criterion: - Manages Changes Throughout the System Lifecycle—A process for managing system changes throughout the lifecycle of the system and its components (infrastructure, data, software and procedures) is used to support system availability and processing integrity. - Authorizes Changes—A process is in place to authorize system changes prior to development. - Designs and Develops Changes—A process is in place to design and develop system changes. - Documents Changes—A process is in place to document system changes to support ongoing maintenance of the system and to support system users in performing their responsibilities. - Tracks System Changes—A process is in place to track system changes prior to implementation. - Configures Software—A process is in place to select and implement the configuration parameters used to control the functionality of software. - Tests System Changes—A process is in place to test system changes prior to implementation. - Approves System Changes—A process is in place to approve system changes prior to implementation. - Deploys System Changes—A process is in place to implement system changes. - Identifies and Evaluates System Changes—Objectives affected by system changes are identified, and the ability of the modified system to meet the objectives is evaluated throughout the system development life cycle. - Identifies Changes in Infrastructure, Data, Software, and Procedures Required to Remediate Incidents—Changes in infrastructure, data, software, and procedures required to remediate incidents to continue to meet objectives are identified, and the change process is initiated upon identification. - Creates Baseline Configuration of IT Technology—A baseline configuration of IT and control systems is created and maintained. - Provides for Changes Necessary in Emergency Situations —A process is in place for authorizing, designing, testing, approving and implementing changes necessary in emergency situations (that is, changes that need to be implemented in an urgent timeframe). Additional points of focus that apply only in an engagement using the trust services criteria for confidentiality: - Protects Confidential Information—The entity protects confidential information during system design, development, testing, implementation, and change processes to meet the entity's objectives related to confidentiality. Additional points of focus that apply only in an engagement using the trust services criteria for privacy: - Protects Personal Information—The entity protects personal information during system design, development, testing, implementation, and change processes to meet the entity's objectives related to privacy.
CHI SR80 Implementing Software and Upgrades in the EHRi Organizations hosting components of the EHRi must put procedures in place to control the implementation of software and upgrades on operational systems hosting these components.
CHI SR81 Protecting EHRi Software Organizations hosting components of the EHRi must maintain control over access to program source libraries for EHRi components where such libraries are within the control of the organization.
CHI SR82 Managing Known Vulnerabilities Organizations hosting components of the EHRi must take steps to test for and prevent the exploitation of published vulnerabilities in systems and software that host those components.