WithPCI Logo
WithPCI.com

6.2.1 Bespoke and custom software are developed securely

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

6.2.1 Bespoke and custom software are developed securely, as follows:

  • Based on industry standards and/or best practices for secure development.
  • In accordance with PCI DSS (for example, secure authentication and logging).
  • Incorporating consideration of information security issues during each stage of the software development lifecycle.

Customized Approach Objective

Bespoke and custom software is developed in accordance with PCI DSS and secure development processes throughout the software lifecycle.

Applicability Notes

This applies to all software developed for or by the entity for the entity's own use. This includes both bespoke and custom software. This does not apply to third-party software.

Defined Approach Testing Procedures

6.2.1 Examine documented software development procedures to verify that processes are defined that include all elements specified in this requirement.

Purpose

Without the inclusion of security during the requirements definition, design, analysis, and testing phases of software development, security vulnerabilities can be inadvertently or maliciously introduced into the production environment.

Good Practice

Understanding how sensitive data is handled by the application—including when stored, transmitted, and in memory—can help identify where data needs to be protected.

PCI DSS requirements must be considered when developing software to meet those requirements by design, rather than trying to retrofit the software later.

Examples

Secure software lifecycle management methodologies and frameworks include PCI Software Security Framework, BSIMM, OPENSAMM, and works from NIST, ISO, and SAFECode.

purpose

Maintain an inventory of bespoke and custom software in use.

compliance strategies

  • Software inventory management
  • Periodic inventory review

typical policies

  • Software Inventory Policy

common pitfalls

  • Untracked custom applications
  • Outdated inventory

type

Process Control

difficulty

Moderate

key risks

  • Unmanaged vulnerabilities in custom code

recommendations

  • Automate inventory tracking

Eligible SAQ

  • SAQ-A-EP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy