Policy for external software developers
External service providers involved in Fronius software development must comply with
the following requirements:
Security by Design
IT security and software security standards must be observed and implemented as early
as the design phase of the system.
Security by Default
Each delivered product must meet - according to the protection requirement - basic IT
security requirements, if applicable, in accordance with the control target lists (OWASP
standards) provided by Fronius.
Security in Deployment
"Security in Deployment" refers to the maintainability of a system/product that is already
in use at the customer. The product must be easy to deploy and administer in order to
keep the application up to date and thus secure in the long term.
Initial IT security concept
IT security requirements must be specified in an initial IT security concept. Depending on
the product
/ the IT security concept is created by Fronius and transmitted to the external ser-
vice provider, or
/ must be prepared by the external service provider and accepted by Fronius.
For the initial safety concept, the following points in particular must be documented:
/ Brief description of the application (purpose, target group)
/ High-level system architecture of the application (client/server, web, use of cloud
services) with all associated remote services,
/ Availability of the application on the Internet (remote maintenance concept, if ap-
plicable),
/ Autonomous deployment of the application at the customer's site (no backend
required, no online connection),
/ Approximate number of users accessing the application,
/ Systems on which this application depends and systems that depend on this ap-
plication.
/ The IT security concept must be documented in the corresponding system and
architecture specifications. Revision is necessary to ensure traceability.
Measures in the development process
/ Mandatory use of version control software