Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Building Trust by Design Agile teams often prioritize the Minimum Viable Product (MVP) to gather early feedback. Yet, in an era of sophisticated threats,a product is only as viable as its security. Enter the Minimum Viable Secure Product (MVSP).

The MVSP is a minimalist security baseline for B2B software and outsourcing partners. It reinforces the truth that security cannot be “added later”—it must be baked into the product using Security by Design principles.

This checklist distills complex security requirements into the absolute essentials, ensuring your product achieves a baseline of trust and resilience without unnecessary bloat.

Business controls

Vulnerability reports

Customer testing

Self-assessment

Perform annual (at a minimum) security self-assessments using the latest MVSP release

External testing

Contract a security vendor to perform annual, comprehensive penetration tests on your systems

Training

Implement role-specific security training for your personnel that is relevant to their business function

Compliance

Incident handling

Include the following information in the notification:

Data handling

Ensure media sanitization processes based on NIST SP 800-88 (or equivalent) are implemented for storage media holding unencrypted production data

Application design controls

Single Sign-On

Implement single sign-on using modern, maintained, and industry standard protocols

HTTPS-only

This does not apply to secure protocols designed to run on top of unencrypted connections, such as OCSP

Security Headers

Apply appropriate security headers to reduce the application attack surface and limit post exploitation:

Password policy

If password authentication is used in addition to single sign-on:

Security libraries

Use modern, maintained, and industry standard frameworks, template languages, or libraries that systemically address implementation weaknesses by escaping the outputs and sanitizing the inputs

Example: ORM for database access, UI framework for rendering DOM

Dependency Patching

Logging

Keep logs of:

Logs must include user ID, IP address, valid timestamp, type of action performed, and object of this action. Logs must be stored for at least 30 days, and should not contain sensitive data or payloads.

Encryption

Use modern, maintained, and industry standard means of encryption to protect sensitive data in transit between systems, and at rest in online data storages and backups

Application implementation controls

List of data

Maintain a list of sensitive data types that the application is expected to process

Data flow diagram

Maintain an up-to-date diagram indicating how sensitive data reaches your systems and where it ends up being stored

Vulnerability prevention

Train your developers and implement development guidelines to prevent at least the following vulnerabilities:

Time to fix vulnerabilities

Produce and deploy patches to address application vulnerabilities that materially impact security within 90 days of discovery

Build and release process

Operational controls

Physical access

Validate the physical security of relevant facilities by ensuring the following controls are in place:

Logical access

Subprocessors

Backup and Disaster recovery

Attribution[1]

Footnotes
  1. This document is public domain- CC0 1.0 Universal. Created by the MVSP Working Group