This page summarizes CLD’s SDLC policy and baseline controls. It is the canonical reference for vendor deliverables, release gates, and evidence required at each stage.
-
Policy owner (ISO): Mary Mouradian
-
Executive Sponsor: (Executive Sponsor name) — approves exceptions and residual risk
-
Vendor Manager: (Vendor Manager name) — vendor performance, evidence cadence, escalation
-
Scope: third‑party web/mobile apps, APIs/integrations, IaC/templates, data pipelines, container images, and major SaaS configurations.
-
Default data residency: Canada‑only for storage and administrative access. Exceptions require documented risk assessment and approval with expiry.
-
Gates: Intake → Design → Pre‑Production → Go‑Live → Post‑Go‑Live (30‑day review). Each gate requires specific evidence and sign‑off (see annexes).
-
Build/CI controls: SAST on change sets; SCA + SBOM per build; secrets scanning; IaC and container image scanning; artifact signing; automated fail gates with documented waivers.
-
Testing & Assurance: DAST pre‑prod; annual 3rd‑party pentest after material changes; annual code scan; evidence package per release (SBOM, SAST/SCA/DAST summaries, changelog, rollback plan, logging schema updates, UAT sign‑off).
-
Vulnerability SLAs (baseline): Critical 7 days / High 30 days / Medium 60 days / Low 90 days. POA&M required for open items with owners and target dates.
-
Logging & SIEM: Mandatory event families (authN/authZ, admin changes, permission changes, lifecycle events, API calls, uploads/exports, control blocks). Retention baseline: 12 months. NTP/time sync required; redaction rules enforced.
-
Identity: SSO (OIDC/SAML) integration with CLD IdP; MFA required for admin and restricted data; standard RBAC roles and time‑boxed third‑party support accounts with auditable sessions.
-
API security: OAuth2/OIDC for user flows; client‑credentials or mTLS for service‑to‑service; token TTLs, scope least‑privilege, rate limits and replay protections.
-
File upload: Allowed MIME types, AV scanning, quarantine behavior, max file size (suggested 100MB), strip image EXIF/GPS metadata on ingest.
-
Availability & DR: Tiered RTO/RPO targets, encrypted backups, restore test cadence and evidence (to be defined per solution tier).
-
Release management: Change classification, notice periods by risk class, rollback plans mandatory, canary/blue‑green recommended for high‑risk releases.
-
Third‑party expectations: SOC2 Type 2 for key vendors/subprocessors where applicable; annual pentest and code scan; cooperation with audits and right‑to‑audit clauses.
-
Metrics & Training: KPIs (release frequency, change failure rate, time‑to‑remediate, evidence completeness); role‑based secure SDLC training required for staff and vendors.
-
Exceptions: Formal exception process with compensating controls, owner, ISO + Executive Sponsor approval, and expiry date.
See annexes for templates: design review checklist, release evidence checklist, POA&M template, SBOM submission instructions, logging field dictionary.
http://localhost:1313/process/ssdlc/policy/