Developing Risk-Based Policies
Developing Risk-Based Policies
Enterprise SCA policies must reflect actual risk rather than theoretical concerns. Classify applications into risk tiers based on data sensitivity, exposure, and business criticality. Internet-facing applications processing payment data require stricter policies than internal development tools. This tiered approach prevents over-securing low-risk applications while ensuring critical systems receive appropriate scrutiny.
# Example: Risk-Based Policy Framework
risk_tiers:
critical:
description: "Customer-facing, payment processing, PII handling"
vulnerability_policy:
critical: block_deployment
high: require_approval
medium: remediate_within_30_days
low: track_only
license_policy:
forbidden: ["GPL-3.0", "AGPL-3.0"]
review_required: ["LGPL-3.0", "MPL-2.0"]
update_requirements:
max_days_outdated: 90
high:
description: "Internal apps with sensitive data"
vulnerability_policy:
critical: require_approval
high: remediate_within_7_days
medium: remediate_within_60_days
low: track_only
medium:
description: "Internal tools, non-sensitive apps"
vulnerability_policy:
critical: remediate_within_30_days
high: remediate_within_90_days
medium: track_only
Implement context-aware policies considering how components are used. A SQL injection vulnerability in a database library might be critical for applications constructing dynamic queries but irrelevant for those using only stored procedures. Reachability analysis determines whether vulnerable code paths are accessible. Environmental factors—network isolation, authentication requirements, compensating controls—influence actual risk. Sophisticated policies prevent alert fatigue while maintaining security.