top of page

Secure software development

Introduction

We integrate information security and privacy within our project management and software development processes (from feature request to release). We do this through fixed project procedures, risk assessment within projects, and secure development practices (security by design and by default), supplemented with privacy by design principles where relevant. These practices are applied within the defined development and project procedures.


Detailed explanation


Project management

Security and privacy aspects are part of our standard project workflow. Relevant requirements and controls are recorded and monitored using tools (such as requirements, issue tracking, release management, and project documentation). This ensures that security aspects are embedded in the development and project process.


Risk assessment within projects

Within projects, we assess whether there are increased security or privacy risks, for example in the case of changes in authentication/authorization, data processing, data modifications, integrations, or dependencies with other services. Items with increased risk are treated as security-relevant and, where applicable, explicitly classified in our tooling (e.g., via security or privacy fields). Based on this, appropriate mitigation actions are planned and implemented.


Secure software development

We work according to “security by design” and “security by default” and apply secure engineering principles. This includes the following practices:

  • use of proven technologies and frameworks

  • (peer) code reviews, with additional requirements for high-risk changes

  • attention to common vulnerabilities (such as OWASP-related risks)

  • automated and manual testing

  • automated code analysis and dependency vulnerability checks

  • internal tooling and checks to identify security issues


For releases, manual checks for outstanding security issues are performed before software is rolled out to acceptance or production.


These practices are embedded in our development processes and supported by internal guidelines, tooling, and standard project procedures.


Privacy by design

Where relevant, we apply privacy by design principles, including data minimization, data separation, abstraction, and shielding. This supports the principle that personal data should only be processed when necessary and that processing should be limited and protected as much as possible.


Responsibilities

Responsibilities for security and privacy within projects are defined and supported by internal guidelines and procedures.

Updated:

27 maart 2026 om 15:20:44

bottom of page