-
Publish the point of contact for security reports on your website
-
Respond to security reports within a reasonable time frame
Minimum Viable Secure Product is a minimalistic security checklist for B2B software and business process outsourcing suppliers.
Designed with simplicity in mind, the checklist contains only those controls that must be implemented to ensure minimally viable security posture of a product.
We recommend that all companies building B2B software or otherwise handling sensitive information under its broadest definition implement at least the following controls, and are strongly encouraged to go well beyond them in their security programs.
1 Business controls | |
---|---|
Control | Description |
1.1 Vulnerability reports FAQ | |
1.2 Customer testing FAQ |
|
1.3 Self-assessment FAQ | Perform annual (at a minimum) security self-assessments using this document |
1.4 External testing FAQ | Contract a security vendor to perform annual, comprehensive penetration tests on your systems |
1.5 Training FAQ | Implement role-specific security training for your personnel that is relevant to their business function |
1.6 Compliance FAQ |
|
1.7 Incident handling FAQ |
|
1.8 Data handling FAQ |
|
2 Application design controls | |
Control | Description |
2.1 Single Sign-On FAQ | Implement single sign-on using modern and industry standard protocols |
2.2 HTTPS-only FAQ |
|
2.3 Security Headers FAQ | Apply appropriate security headers to reduce the application attack surface and limit post exploitation:
|
2.4 Password policy FAQ | If password authentication is used in addition to single sign-on:
|
2.5 Security libraries FAQ | Use frameworks, template languages, or libraries that systemically address implementation weaknesses by escaping the outputs and sanitizing the inputs Example: ORM for database access, UI framework for rendering DOM |
2.6 Dependency Patching FAQ | Apply security patches with a severity score of "medium" or higher, or ensure equivalent mitigations are available for all components of the application stack within one month of the patch release |
2.7 Logging FAQ | Keep logs of:
Logs must include user ID, IP address, valid timestamp, type of action performed, and object of this action. Logs must be stored for at least 30 days, and should not contain sensitive data or payloads. |
2.8 Encryption FAQ | Use available means of encryption to protect sensitive data in transit between systems and at rest in online data storages and backups |
3 Application implementation controls | |
Control | Description |
3.1 List of data FAQ | Maintain a list of sensitive data types that the application is expected to process |
3.2 Data flow diagram FAQ | Maintain an up-to-date diagram indicating how sensitive data reaches your systems and where it ends up being stored |
3.3 Vulnerability prevention FAQ | Train your developers and implement development guidelines to prevent at least the following vulnerabilities:
|
3.4 Time to fix vulnerabilities FAQ | Produce and deploy patches to address application vulnerabilities that materially impact security within 90 days of discovery |
3.5 Build process FAQ | Build processes must be fully scripted/automated and generate provenance (SLSA Level 1) |
4 Operational controls | |
Control | Description |
4.1 Physical access FAQ | Validate the physical security of relevant facilities by ensuring the following controls are in place:
|
4.2 Logical access FAQ |
|
4.3 Subprocessors FAQ |
|
4.4 Backup and Disaster recovery FAQ |
|
License
This document is public domain under CC0 1.0 Universal license.