16.11: Leverage Vetted Modules or Services for Application Security Components

CSF v1.1 References:

PF v1.0 References:

Group:

Info icon.

Control is new to this version of the control set and incorporates the following item from the previous version: 18.5: Use Only Standardized and Extensively Reviewed Encryption Algorithms.

Control Statement

Leverage vetted modules or services for application security components, such as identity management, encryption, and auditing and logging. Using platform features in critical security functions will reduce developers’ workload and minimize the likelihood of design or implementation errors. Modern operating systems provide effective mechanisms for identification, authentication, and authorization and make those mechanisms available to applications. Use only standardized, currently accepted, and extensively reviewed encryption algorithms. Operating systems also provide mechanisms to create and maintain secure audit logs.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]