Documentation
HECVAT Full v3.0.6
Vulnerability Scanning
VULN-05

Question VULN-05

Describe or provide a reference to how you monitor for and protect against common web application security vulnerabilities (e.g., SQL injection, XSS, XSRF, etc.).

Weight20
High RiskNo
RequiredYes
Compliant AnswerYes

Standard Guidance

Ensure that all elements of VULN-05 are clearly stated in your response.

Answering "NO"

EDUCAUSE provides no guidance here

Answering "YES"

EDUCAUSE provides no guidance here

Reason for Question

The adherence to secure coding best practices better positions a vendor to maintain the CIA triad. Use the knowledge of this response when evaluating other vendor statements, particularly those focused on development and the protection of communications. Vendors should be monitoring for and addressing these issues in their products.

Follow-Up Inquiries

If information security principles are not designed into the product lifecycle, point the vendor to OWASP's Secure Coding Practices - Quick Reference Guide at https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide (opens in a new tab)
Inquire about the tools a vendor uses, the interval at which systems are monitored/mitigated, and who is responsible for the process/procedure in place for this monitoring.

HECVAT Pro Advice

[Add expert insights and best practices]

Implementation Tips

[Add practical steps for SME SaaS vendors]

FAQ

[Add common questions related to this HECVAT item]

Resources

[Add links to relevant articles or tools]