eXtended Automation Engineering (XAE)

Unauthorized manipulation of the source code.

Countermeasures

Description

Technical

  • Define permissions and implement with software protection
  • Use version control system to make changes traceable
  • Use individual access control for version control system

Organizational

  • Use IT security management system (e.g. according to ISO 27001)
  • Use version control system (see: Source-Control):
  • Use "staging":
    • Check-in to development source control repository first.
    • Use separate (pre-)release build repository to build alpha, beta, RC and release versions from there
    • Transfer development repository -> (pre-)release build repository only after review, for example using Project Compare Tool (see: Project Compare Tool)
Unauthorized access to the source code.

Countermeasures

Description

Technical

Organizational

  • Use IT security management system (e.g., according to ISO 27001).
  • Secure access to storage locations.
  • Use encrypted storage.