Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Secure Software Development Framework (SSDF)

NIST Secure Software Development Framework (SSDF)

The NIST Secure Software Development Framework, or NIST SP 800-218, is a set of practices employed by NIST to be embedded in the development cycle of software. The framework promotes the concept of “security-by-design,” which supports developers in discovering and solving vulnerabilities at every stage of development. This approach reduces the chances that released software harbors undiscovered vulnerabilities and actively addresses the root causes of those vulnerabilities to make the software more resilient.

There are four core activities of the SSDF:

  1. Prepare the Organization: It focuses on establishing a culture that is security-oriented and preparing training programs for the security teams based on security best practices.
  2. Protect the Software: This phase of the handbook tells organizations what should be done to protect the software throughout its lifecycle and includes secure coding practices, code review, and more.
  3. Produce Well-Secured Software: In this phase, defects are discovered and fixed at design stage and tested continuously at the time of development.
  4. Address Vulnerabilities: This involves patch management and incident responses in a way that every vulnerability found can be solved and addressed to maintain the integrity and security of the software even after release.

The SSDF accommodates other NIST frameworks into its system to thereby create a holistic approach for software security.

Additional reading

ISO 27001 Risk Treatment Plans

How to create ISO 27001 Risk Treatment Plan? (Downloadable template)

Confidentiality, integrity, and availability, collectively known as the CIA triad, form the cornerstones of protecting information within the ISO 27001 framework. When a risk materializes, any or all of these elements can be compromised, leaving assets unprotected and objectives unmet. That is why a risk treatment plan (RTP) is central to ISO 27001. A well-structured…

How to perform Compliance Gap Analysis?

When it comes to compliance, starting off on the right foot requires surveying your present conditions. It has a defining impact on how fast companies get to the audit-ready phase and reap the benefits of certification. Chief compliance officers see compliance gap analysis as a guiding method to steering their compliance efforts. Conducting a thorough…

What Should a Cybersecurity Stack Look Like?

According to a report by Accenture, 43% of cyberattacks were aimed at SMBs, but only 14% were prepared to defend them. This is a direct indication of how important it is to have the right technological infrastructure. And so, what comprises of a good cybersecurity stack? Businesses are asking themselves this question more frequently with…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.