Skip to main content

Standard for Security in Development and Support Processes

I. Purpose

The purpose of this standard is to establish the university’s obligation to ensure that information security is designed and implemented within the development lifecycle of information systems.

II. Scope

It is the responsibility of any party considering development of an information system within the University environment to understand and apply information security rules which ensure appropriate security for the system.

III. Contacts

Direct any general questions about this standard to your unit’s Information Security Liaison. If you have specific questions, please contact OneIT Information Security Compliance at ISCompliance-group@charlotte.edu.

IV. Standard

Secure development

Secure development is critical for building any secure service architecture, software or system. These requirements should be considered:

Technical review of applications after operating platform changes

When operating platforms including operating systems, databases and middleware platforms are changed, business critical applications should be reviewed and tested to ensure there is no adverse impact on organizational operations or security. The following should also be considered:

Restrictions on changes to software packages

Modifications to vendor supplied software packages is discouraged and limited to necessary changes. All changes should be strictly controlled. The following should be considered:

Secure development environment

A secure development environment includes people, processes and technology associated with system development and integration.Risks associated with individual system development efforts should be assessed and secure development environments established with the following considerations:

Outsourced development

Where a system is outsourced, the following points should be considered:

System security testing

Security functionality should be tested throughout the development process and should include a detailed schedule of activities and expected results under a range of conditions.

System acceptance testing

Acceptance testing and criteria should be established for new information systems, upgrades and new versions.The following should be considered:

Related Resources

ISO/IEC 27002 was adopted by The University of North Carolina at Charlotte in 2012. All standards and guidelines are based on this code of practice for Information Security Management.

Revision History

Initially approved by Information Assurance Committee 5/15/15
Updated 11/02/23