Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Vendor-Neutral Initiative Sets Bare-Minimum Baseline for Security

Google on Wednesday announced the Minimum Viable Secure Product (MVSP) initiative, partnering with some of tech’s biggest names to create a vendor-neutral minimum baseline criteria for secure products.

Google on Wednesday announced the Minimum Viable Secure Product (MVSP) initiative, partnering with some of tech’s biggest names to create a vendor-neutral minimum baseline criteria for secure products.

Aimed at eliminating the need for organizations to design and implement their own security baselines, the MVSP effort is vendor agnostic and is designed to increase clarity during each phase of the procurement process.

Built and backed by organizations like Google, Okta, Salesforce, Slack, and others, the initiative aims to increase the minimum bar for security and to simplify the vetting process.

Through MVSP, a set of minimum security requirements is being developed for business-to-business applications, as well as for outsourcing suppliers. A series of proposed controls should be implemented to ensure that minimum security is achieved and to help improve security posture.

At a bare minimum, the MVSP mandates that vendors should implement vulnerability reporting processes and should allow customer testing. Organizations should perform reviews of their security programs, should allow for external testing, should perform training of their employees, should ensure they are compliant to standards and requirements, and make sure they have incident response and data sanitization in place.

[ READ: How to Plan Your M&A Security Strategy ]

For applications, the initiative requires the implementation of Single Sign-On and HTTPS-only, as well as the existence of content security and password policies, the use of standardized libraries to improve security, the implementation of processes to identify and address vulnerabilities, logging, encryption, and backup and disaster recovery capabilities.

Various other application implementation and operational controls are also included, to help security teams perform vendor assessments and internal reviews faster, as well as compliance teams, legal teams, and procurement teams in their efforts.

Advertisement. Scroll to continue reading.

“We recommend that all companies building B2B software or otherwise handling sensitive information under its broadest definition implement the listed controls and are strongly encouraged to go well beyond them in their security programs,” the group said in a statement.

Related: Meeting Backup Requirements for Cyber Insurance Coverage

Related: How to Plan Your M&A Security Strategy

Related: Google Details New Privacy and Security Policies for Android Apps

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.