The Definitive Guide to Data Quality
1. Describe the secure development methods (e.g. ISO-27034) used in coding and the internal and external testing used to validate the code as free from vulnerability.
2. Please provide the logging API used by the various software components.
3. Please detail the processes used in lifecycle vulnerability identification and patch release.