Secure Development (SDLC) - In addition to the controls and tests performed during the implementation process, we develop the skill in secure development in-house. To this end, we provide training that includes OWASP's top 10 security risks, common attack vectors, and security controls .
Segregation of environments - There is a separation of development, approval and production environments, each considering their respective access permissions. The production environment follows the least privilege concept and no production data is used in our development or test environments .
Pentest execution - Every year, we hire an independent third-party company to perform a gray box pentest .
Static Code Analysis - SAST - Every build pipeline is examined using a static code analysis tool. With this tool, categories of software defects are evaluated, including: code smells, vulnerabilities and security hotspots .
SCA Analysis - Software Composition Analysis - Verification of component software, libraries, and search for vulnerabilities is performed .
Source code storage - Source codes are stored in a private Git repository, with authorized access using built-in authentication .
Secret Management - Sensitive application information such as API keys and database passwords are stored in password vault with activity log and restricted network access .
Dedicated Security Team - Our security team is available to respond to security alerts and events .