WikiArtifactsSecure Development Policy

Secure Development Policy

Policy
Updated: 2026-02-21

The Secure Development Policy defines how software is designed, built, tested, and released using security-by-design practices throughout the software development lifecycle (SDLC). It establishes baseline requirements for source control, code review, CI/CD, dependency management, environment separation, and security testing so that changes to code and infrastructure are controlled, repeatable, and verifiable. The policy is intended to be framework-agnostic: it focuses on practical engineering controls (who can change what, what checks must pass, and what evidence is retained) rather than prescribing a single toolchain. When applied consistently, it reduces common delivery risks such as insecure defaults, secret leakage, dependency compromise, and unreviewed pipeline changes.

Secure SDLC Baseline Checklist

A compact checklist you can apply across repositories and services.

1.Source Control: Restricted admin access; protected default branch.
2.Review: Required pull request review(s) for production-impacting changes.
3.CI Gates: Required status checks must pass before merge.
4.Secrets: Secret scanning + no hard-coded secrets; least-privilege tokens.
5.Dependencies: Vulnerability scanning + pinned versions for critical services.
6.Testing: SAST baseline; risk-based DAST for exposed services.
7.Releases: Traceable approvals; artifact integrity controls where feasible.
8.Exceptions: Documented, time-boxed exceptions with follow-up actions.

Secure Development Lifecycle Flow

A policy-aligned SDLC workflow from design to release.

Rendering diagram...

Example Policy Gate Criteria (Pseudo)

A concise definition of what blocks a merge or release.

merge_allowed = (
  pr_reviews >= 1
  AND status_checks == 'PASS'
  AND secrets_scan == 'PASS'
  AND sast_findings.severity_critical == 0
)

release_allowed = (
  merge_allowed
  AND dependency_scan.severity_critical == 0
  AND approvals.contains('release_owner')
)

A secure development policy defines the minimum security controls and review steps required to build and release software safely. It typically covers secure design expectations, coding standards, source control rules, CI/CD protections, security testing, dependency management, and release governance.

High-level security policies describe goals (e.g., protect data and prevent unauthorized access). Secure SDLC controls define how those goals are implemented during engineering work—who can approve changes, what tests must pass, how dependencies are validated, and how releases are authorized.

Common baseline requirements include: version control with restricted admin access, mandatory code review, branch protection, least-privilege CI/CD permissions, secrets management, dependency vulnerability checks, security testing (SAST and targeted DAST as needed), and controlled releases with traceable approvals.

Typical rules include: at least one independent reviewer for production-impacting changes, elevated review for authentication/authorization, crypto, logging, and data handling changes, and documented exceptions. Many teams also require passing automated checks before merge and limit who can bypass protections.

Recommended controls include: protected pipelines (restricted edits), least-privilege tokens, separation of build and deploy permissions, restricted secret access, signed artifacts where feasible, and immutable logs for pipeline runs. Teams often treat pipeline definition changes as high-risk and require stronger review.

Use pre-commit checks and secret scanning, enforce environment-based secret injection (never hard-code), rotate credentials when exposed, and limit token scope. Add controls to block merges when secrets are detected and track remediation actions as evidence.

Maintain an inventory of critical dependencies, scan for known vulnerabilities, pin versions, restrict untrusted package sources, and review high-risk updates. Many teams generate or maintain an SBOM for key services and use policy gates for critical severity issues.

Not necessarily. Many organizations apply SAST broadly (fast, consistent) and use DAST selectively based on risk and system type (e.g., internet-facing apps). The policy should define where each test applies and what severity thresholds block release.

Define an emergency path with strict scope: time-boxed approvals, post-change review, documented rationale, and follow-up remediation. The goal is to enable rapid response while preserving traceability and preventing emergency access from becoming the default path.

Common evidence includes: pull request review history, branch protection settings, CI/CD run logs, test results, vulnerability scan outputs, dependency policies, release approvals, and change tickets where used. Evidence should be retained in line with policy and risk. WatchDog Security can help by mapping these artifacts to control requirements in Compliance Center and generating exportable evidence packages, while Secure File Sharing supports encrypted, auditable sharing with external auditors or customers.

Many teams validate SDLC controls by periodically checking repository settings (branch protection, required reviews, status checks, admin overrides), CI/CD permissions, secret scanning configuration, and workflow change controls. Automated checks using platform APIs and configuration baselines can help detect drift or gaps over time and produce audit-ready evidence without relying on manual screenshots. WatchDog Security can centralize the resulting evidence in Compliance Center for audit-ready exports, and track material drift as remediation work in the Risk Register with owners, due dates, and treatment plans.

Secure SDLC practices commonly align across many frameworks because they focus on access control, change management, secure configuration, vulnerability management, and supplier security. A practical approach is to keep one core policy and map its requirements to framework controls via a crosswalk, updating the mapping as frameworks change. WatchDog Security supports this approach with Compliance Center for multi-framework control mapping and exportable evidence packages, and Policy Management for version control, approvals, and acceptance tracking as the policy evolves.

A GRC platform can keep your secure development policy current, approved, and consistently adopted across teams. With WatchDog Security, Policy Management provides templates, version control, approval workflows, and acceptance tracking so you can prove the policy is reviewed and acknowledged. Compliance Center can then map the policy and related evidence to multiple frameworks and generate exportable evidence packages for audits.

Teams often automate evidence by capturing pull request reviews, CI/CD run logs, scan results, and release approvals in a structured way. WatchDog Security helps centralize this using Compliance Center to organize artifacts into exportable evidence packages, while Vulnerability Management can ingest findings from multiple sources and track triage workflows and MTTR analytics. Secure File Sharing can be used to share selected evidence externally with encrypted links, TOTP verification, and audit logs.

VersionDateAuthorDescription
1.0.02026-02-21WatchDog Security GRC Wiki TeamInitial publication