Skip to content
arrow_back
search
Annex A 8.28 verified ISO/IEC 27001:2022

Secure Coding Practices in Software Development

Ensure software is built securely to prevent vulnerabilities.

record_voice_over

Plain language

This control is about making sure that the software your business uses or develops is built in a way that keeps it safe from hackers and glitches. If this isn’t done, your software might have weak spots that bad actors could exploit to steal your information or disrupt your operations.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Secure coding principles shall be applied to software development.
verified ISO/IEC 27001:2022 Annex A 8.28
priority_high

Why it matters

Poor secure coding increases risk of data breaches and operational disruptions due to exploitable software vulnerabilities.

settings

Operational notes

Maintain secure coding standards with peer reviews, SAST/DAST and dependency scanning; refresh secure patterns and train developers on OWASP risks.

Mapping detail

Mapping

Direction

Controls