Application Security Testing Procedure (ENG-PROC-001)
1. Purpose
The purpose of this procedure is to detail the process for conducting static application security testing (SAST), dynamic application security testing (DAST), and penetration testing to identify and remediate security vulnerabilities in applications.
2. Scope
This procedure applies to all company-developed applications, with specific requirements for those that handle electronic Protected Health Information (ePHI) or data classified as Confidential.
3. Overview
This procedure outlines the required security testing for applications, including automated SAST and DAST scans integrated into the development lifecycle and annual penetration tests for sensitive applications. It covers the process from testing and triaging findings to tracking remediation.
4. Procedure
4.1 Static Application Security Testing (SAST)
Step | Who | What |
---|---|---|
1 | Developer | Integrates SAST tooling into the CI/CD pipeline for automated code analysis on every build or pull request. |
2 | Developer | Reviews SAST reports for security vulnerabilities, focusing on high and critical severity findings. |
3 | Developer | Triages identified vulnerabilities, creating tickets to track remediation efforts. False positives are documented and suppressed. |
4 | Development Team | Remediates vulnerabilities according to their severity and documents the fixes in the corresponding tickets. |
4.2 Dynamic Application Security Testing (DAST)
Step | Who | What |
---|---|---|
1 | Security Team / Developer | Configures and runs DAST scans against applications in a staging or testing environment before production deployment. |
2 | Security Team / Developer | Analyzes DAST scan results to identify runtime vulnerabilities. |
3 | Developer | Triages, prioritizes, and remediates identified vulnerabilities based on risk. |
4.3 Penetration Testing
Step | Who | What |
---|---|---|
1 | Security Team | Engages a qualified third-party vendor to conduct penetration tests at least annually on all applications that handle ePHI or Confidential data. |
2 | Security Team | Receives the final penetration test report from the vendor. |
3 | Security & Development Teams | Review the report findings, develop a remediation plan for identified vulnerabilities, and create tickets to track the required work. |
4 | Development Team | Implements the remediation plan and provides evidence of fixes for re-testing and validation. |
5. Standards Compliance
Procedure Step(s) | Standard/Framework | Control Reference |
---|---|---|
4.1 - 4.3 | SOC 2 | CC7.1, CC8.1 |
4.1 - 4.3 | HIPAA Security Rule | 45 CFR § 164.308(a)(8) |
6. Artifact(s)
A test report from the relevant security tool (SAST, DAST) or a final penetration test report with a remediation plan.
7. Definitions
DAST (Dynamic Application Security Testing): A method of testing an application during its running state to find security vulnerabilities.
ePHI (electronic Protected Health Information): Any protected health information that is created, stored, transmitted, or received in any electronic format.
SAST (Static Application Security Testing): A method of testing an application’s source code, bytecode, or binary code to find security vulnerabilities without executing the application.
8. Responsibilities
Role | Responsibility |
---|---|
Developer | Integrates and runs SAST/DAST tools, reviews findings, and remediates vulnerabilities. |
Security Team | Manages the penetration testing program, assists with DAST, and provides guidance on vulnerability remediation. |
Development Team | Ensures vulnerabilities are triaged and remediated in a timely manner based on risk. |