16.9
IG2 IG3

Train Developers in Application Security Concepts and Secure Coding

Asset Type: Applications
Security Function: Protect

Description

Ensure that all software development personnel receive training in writing secure code for their specific development environment and responsibilities. Training can include general security principles and application security standard practices. Conduct training at least annually and design in a way to promote security within the development team, and build a culture of security among the developers.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Develop or procure training content
7
Define training audience and completion requirements
8
Deploy training and track completion rates
9
Measure training effectiveness through testing/simulation

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Developer Introduces Injection Vulnerability Due to Lack of Training

Confidentiality

A developer writes code vulnerable to SQL injection because they were never trained on parameterized queries or input validation in their specific development framework.

Insecure Deserialization Flaw from Untrained Developer

Integrity

A developer implements object deserialization from untrusted input without sanitization because they lack training on deserialization attacks, enabling remote code execution.

Vulnerabilities (When Safeguard Absent)

Developers Lack Secure Coding Knowledge

Without application security training, developers are unaware of common vulnerability patterns in their specific frameworks and languages, systematically introducing preventable security flaws.

No Security Culture Within Development Teams

Absence of security-focused developer training means security is treated as an afterthought rather than an integral part of the development process, resulting in insecure-by-default code.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Training completion records and compliance rates Tracked continuously, reported quarterly
Document Training content and curriculum documentation Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually