16.8
IG2 IG3

Separate Production and Non>Production Systems

Asset Type: Applications
Security Function: Protect

Description

Maintain separate environments for production and non-production systems.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Test Data Leak from Development Database in Production Network

Confidentiality

An attacker compromises a development database containing a copy of production customer data because development and production systems share the same network segment and security controls.

Unstable Development Code Crashes Production System

Availability

A developer accidentally deploys experimental code to a production server because development and production environments are not separated, causing a production outage.

Attacker Pivots from Development to Production Environment

Confidentiality

An attacker compromises a weakly secured development server and uses it as a pivot point to access production systems because both environments share infrastructure and credentials.

Vulnerabilities (When Safeguard Absent)

No Separation Between Production and Non-Production Environments

Without environment separation, development, staging, and production systems share networks, credentials, or infrastructure, allowing issues or compromises in non-production to directly impact production.

Shared Credentials and Access Between Environments

Co-mingled environments often share database credentials, API keys, and service accounts, meaning a compromise of the less-secured development environment exposes production secrets.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually