The new web application passes all functional tests and goes live on schedule. Two weeks later, a penetration test reveals SQL injection, insecure direct object references and missing rate limiting. Fixing these issues in production takes three sprints — more than building them correctly would have taken. A.8.25 requires that security is designed and implemented within the development lifecycle, from specification through deployment.
Retrofitting security is expensive, disruptive and often incomplete. This control demands that organizations integrate security into every phase of the development process — requirements, design, implementation, testing and deployment.
What does the standard require?
- Establish secure development rules. Define policies and procedures for secure development that apply to all software produced by or for the organization.
- Separate environments. Development, testing and production environments must be separated with controlled promotion between them.
- Integrate security into each phase. Security requirements during specification, threat modelling during design, secure coding during implementation, security testing before deployment.
- Train developers. Ensure developers have the skills to identify and prevent common vulnerabilities.
- Extend to outsourced development. When development is outsourced, the same security standards apply and must be contractually enforced.
In practice
Define a secure SDLC. Document your development process with security activities at each stage: threat modelling in design, secure coding standards during implementation, SAST/DAST in the pipeline, manual penetration testing before major releases.
Implement security gates in the pipeline. Configure your CI/CD pipeline to block deployments that fail security checks. A critical SAST finding or a known-vulnerable dependency should prevent the build from reaching production.
Conduct threat modelling for new features. Before writing code, analyse the feature for potential threats using STRIDE, PASTA or another threat modelling methodology. Document threats, mitigations and residual risks.
Provide developer security training. Regular training on the OWASP Top 10, secure coding practices for your technology stack and hands-on workshops. Measure effectiveness through code review metrics and vulnerability trends.
Typical audit evidence
Auditors typically expect the following evidence for A.8.25:
- Secure development policy — documented SDLC with security activities at each phase (see Secure Software Development Policy in the Starter Kit)
- CI/CD pipeline configuration — evidence of automated security gates
- Threat model documentation — threat models for critical applications
- Developer training records — evidence of security training
- Environment separation evidence — proof that dev, test and production are separated
KPI
Percentage of development projects following the secure development lifecycle
Measured as a percentage: how many active development projects have documented compliance with the secure SDLC? Target: 100%.
Supplementary KPIs:
- Percentage of deployments that pass all automated security gates
- Number of vulnerabilities found in production vs. pre-production (target: decreasing ratio)
- Percentage of developers who completed security training in the last 12 months
BSI IT-Grundschutz
A.8.25 maps to BSI modules for software development:
- CON.8 (Software Development) — the core module. Requires a documented development process with integrated security measures, environment separation and secure coding practices.
- APP.7 (Development of Individual Software) — additional requirements for custom-developed applications.
- CON.10 (Developing Web Applications) — specific security requirements for web application development.
Related controls
- A.8.26 — Application Security Requirements: Security requirements that feed into the SDLC.
- A.8.27 — Secure System Architecture and Engineering Principles: Architecture principles applied during the design phase.
- A.8.28 — Secure Coding: Coding standards applied during the implementation phase.
- A.8.29 — Security Testing in Development and Acceptance: Testing activities within the SDLC.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.25 — Secure development life cycle
- ISO/IEC 27002:2022 Section 8.25 — Implementation guidance for secure development life cycle
- BSI IT-Grundschutz, CON.8 — Software Development