AIS-06: Automated Secure Application Deployment

Info icon.

Control is new to this version of the control set and incorporates the following items from the previous version: AIS-01: Application Security, AIS-03: Data Integrity.

Control Statement

Establish and implement strategies and capabilities for secure, standardized, and compliant application deployment. Automate where possible.

Implementation Guidance

The strategies should include:

  1. Defined security and automation requirements based on an organization's application deployment needs and standards.
  2. Defined roles and responsibilities between security, application teams, and other stakeholder groups.
  3. Identification and integration with existing application deployment processes.
  4. Customization of secure application deployment for deployment types such as operating systems, network connections, configuration, etc.
  5. Logging and monitoring of secure application deployment so that data issues can be promptly addressed by the appropriate people (incident or forensics).
  6. Metrics to effectively measure deployment success.

The capabilities should be based on the organization's SSDLC and should include, for instance:

  1. Defined and approved list of deployment and automation technologies.
  2. Enablement for team members (e.g., developers, administrators, etc.) to dynamically address security issues when needed.

The strategies and capabilities should be reviewed periodically by senior management.

Auditing Guidance

  1. Examine policy and procedures for implementation of application deployment.
  2. Determine if segregation of duties (role and responsibilities) is clearly defined among security and application teams.
  3. Determine if Identification and integration process is defined and verified for application deployment processes.
  4. Evaluate the extent of automation deployed, and criteria used.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.