Security of System Files. ▪ Access to source code must be limited and controlled. ▪ During and after development, all applications must ensure the security of system files, plus access to source code and test data. ▪ All back-door maintenance hooks must be removed from the application before production use. ▪ Application architecture must prohibit databases containing confidential information from residing on the same server as the application.
Appears in 1 contract
Security of System Files. ▪ Access to source code must be limited and controlled. ▪ During and after development, all applications must ensure the security of system files, plus access to source code and test data. ▪ All back-door maintenance hooks must be removed from the application before production use. ▪ Application architecture must prohibit databases containing confidential information from residing on the same server as the application.
Appears in 1 contract